Static task
static1
Behavioral task
behavioral1
Sample
3bf2f8b1ef546f05893c83c03eba5940.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3bf2f8b1ef546f05893c83c03eba5940.exe
Resource
win10v2004-20231215-en
General
-
Target
3bf2f8b1ef546f05893c83c03eba5940
-
Size
132KB
-
MD5
3bf2f8b1ef546f05893c83c03eba5940
-
SHA1
1ce95890bd3aae5c972dc08fb98ed1b623ffef86
-
SHA256
203cc55c2c9bda93c755eefb3be743b13a31bed9654f37dd71a576becde70dbb
-
SHA512
263ac0b84d112dba74a387687472cf8077c83183506c0a9dc9b53b6276a9a0beeea94e49e16acafc5426557aa90e12fca8a375d42463eaa9d968a5df3eb99f77
-
SSDEEP
3072:d2OBXMqLvIP75rTTK/h4KtBfqXKPRPRU6/OYqF3+8/xHvfR:dNDETTq7xPRU3P/R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bf2f8b1ef546f05893c83c03eba5940
Files
-
3bf2f8b1ef546f05893c83c03eba5940.exe windows:4 windows x86 arch:x86
4f3253d89c52698bfd4842d733fdc827
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
CreateFileA
CloseHandle
WriteFile
GetSystemDirectoryA
GetFileTime
SetFileTime
GetWindowsDirectoryA
lstrcatA
FreeLibrary
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alloy32 Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alloy32 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alloy32 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alloy32 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE