Static task
static1
Behavioral task
behavioral1
Sample
3db066c1b7f97614caa90e2465d56a4d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3db066c1b7f97614caa90e2465d56a4d.exe
Resource
win10v2004-20231222-en
General
-
Target
3db066c1b7f97614caa90e2465d56a4d
-
Size
46KB
-
MD5
3db066c1b7f97614caa90e2465d56a4d
-
SHA1
06a2273f595dcc2247f9f8d776b591ecd02f5f9f
-
SHA256
5c7910c873bf530b73ebb75748a62c2c2daa34ef1d2f11104f134b6303aba3eb
-
SHA512
f2ea1f8e6043b01f9aecc97ae8e93b7da7037cbce7e271e1936318f9ef2f7a5bf13f047049f09b8849cbf667da2e13546254c505de1f403dba53c923914f3131
-
SSDEEP
768:ToFiod2AXaM9R1+dzD2v3Vg6tygdtWbjHteuQFWwOq9Lk/LJ6MnZ9VFgasx1nr9E:sfd2qz6ziv3Vg6ijNeuspVMZLTsxhr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3db066c1b7f97614caa90e2465d56a4d
Files
-
3db066c1b7f97614caa90e2465d56a4d.exe windows:5 windows x86 arch:x86
45aeea532a79e51629617932744825c6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ToUnicode
GetClassNameW
GetKeyboardState
DispatchMessageW
CharLowerBuffA
DrawIcon
GetClipboardData
FindWindowExW
GetMessageW
SetProcessWindowStation
GetDlgItemTextW
SetThreadDesktop
OpenDesktopA
GetMessageA
EndDialog
GetIconInfo
ExitWindowsEx
GetDlgItemTextA
OpenWindowStationA
GetWindowThreadProcessId
PeekMessageA
LoadCursorW
CloseDesktop
GetForegroundWindow
GetWindowTextW
MsgWaitForMultipleObjects
SendMessageW
PeekMessageW
GetWindowLongW
GetDlgItem
GetKeyState
CloseWindowStation
GetCursorPos
kernel32
GetModuleFileNameA
GetFileSize
GetThreadPriority
GetSystemTime
ReleaseMutex
UnmapViewOfFile
WriteFile
HeapReAlloc
ExpandEnvironmentStringsW
GetCommandLineA
SetLastError
GetFileTime
SetFileAttributesW
OpenProcess
GetSystemTimeAsFileTime
CreateThread
lstrcmpiA
GetProcessHeap
GetLocalTime
CreateMutexW
FlushFileBuffers
GetModuleHandleA
GetTimeZoneInformation
GetUserDefaultUILanguage
GetTickCount
FindClose
HeapFree
GetModuleFileNameW
lstrcpyW
lstrlenW
OpenMutexW
DisconnectNamedPipe
GetComputerNameW
GetLogicalDrives
ResetEvent
GetCurrentThreadId
MultiByteToWideChar
GetTempPathW
CopyFileW
GetExitCodeProcess
HeapAlloc
SetFilePointer
LeaveCriticalSection
CreateFileW
GlobalUnlock
GlobalLock
SetEndOfFile
GetFileSizeEx
DeleteFileW
GetDriveTypeW
lstrcpynW
GetProcessTimes
lstrlenA
CreateEventW
CreateDirectoryW
ReadFile
GetTempFileNameW
Sections
.nonml Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lyt Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wbwp Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ