Static task
static1
Behavioral task
behavioral1
Sample
3d56ce5af8b6726ba0660a3c24fa1b53.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d56ce5af8b6726ba0660a3c24fa1b53.exe
Resource
win10v2004-20231215-en
General
-
Target
3d56ce5af8b6726ba0660a3c24fa1b53
-
Size
64KB
-
MD5
3d56ce5af8b6726ba0660a3c24fa1b53
-
SHA1
c2ecf4f57e0a1b7a685a0c778f6f1cacf7f6625a
-
SHA256
ff6720b816f11a6e2e63e4c99b182f129f7c3491f65691e248e09ea01de4609f
-
SHA512
bf4e88d8724656288ebf64669af70f1dd485fe148eb24ca39253b9882166acd1340776ce827acc213a44693f180901af5c9293b928e90b40a078651d243c5b81
-
SSDEEP
768:FQPzQaYFAX2K/0fSugkM4I5Ab7jTBNiphJQdKLFLQE3Q9+Nnkk+ImBCEB2Y:faYO/MfSugjdgmhJR2ifDm32Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d56ce5af8b6726ba0660a3c24fa1b53
Files
-
3d56ce5af8b6726ba0660a3c24fa1b53.exe windows:4 windows x86 arch:x86
37fef98ac5a68eb65408dc80a80b1334
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateJobObject
RtlZeroMemory
AllocConsole
GetCurrentDirectoryA
GetConsoleDisplayMode
WriteProfileStringA
SetCurrentDirectoryA
GetNextVDMCommand
SetThreadExecutionState
SetConsoleInputExeNameA
lstrcpyA
ReplaceFile
OpenProfileUserMapping
GetCommandLineA
ScrollConsoleScreenBufferA
GetCommandLineA
ExitProcess
GetStartupInfoA
IsBadReadPtr
GetCurrencyFormatA
FindNextFileA
GlobalMemoryStatus
WaitNamedPipeA
SetConsoleCP
SetDefaultCommConfigA
GetThreadTimes
HeapValidate
GetStringTypeExA
GetLogicalDrives
Sections
ATSEC0 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ATSEC1 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ATSEC2 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ