Static task
static1
Behavioral task
behavioral1
Sample
3dc30932295ae343369e779c1107ddbf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dc30932295ae343369e779c1107ddbf.exe
Resource
win10v2004-20231215-en
General
-
Target
3dc30932295ae343369e779c1107ddbf
-
Size
407KB
-
MD5
3dc30932295ae343369e779c1107ddbf
-
SHA1
16a646ade7fd8fc0fc48ee31f3a7a44fe8a9d44e
-
SHA256
05a1fe7b725894cbbebdc880c2443ba6a240e30e0f71782542706d732b70d8ea
-
SHA512
4b2736443ef2faf587ec3d093e744ae3f115d9fed339333ad7d816e1198e6c4784a64f4572fdb0ad015e282cd60ff71697e157d0ec44856c1d3bd9e8a87ee4c2
-
SSDEEP
6144:AeLPOTS0vyJYn8ClJxoNBBp0R0NnR4HeeXlh7G300St5Fg50HIyC8Bh+hdZlSxxL:fDFFbueR4/DG300VqC8Bh+hY/NYbgW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dc30932295ae343369e779c1107ddbf
Files
-
3dc30932295ae343369e779c1107ddbf.exe windows:4 windows x86 arch:x86
7597a13918b02da3a59deebedbacfd5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetPixel
SelectClipPath
PolylineTo
GetViewportExtEx
GetArcDirection
CreateRoundRectRgn
GetWindowExtEx
SetRectRgn
CombineRgn
SetBkMode
Ellipse
FrameRgn
wininet
InternetWriteFileExW
InternetCombineUrlW
ShowCertificate
FindNextUrlCacheContainerA
InternetGetConnectedState
DeleteUrlCacheContainerW
FindCloseUrlCache
FreeUrlCacheSpaceA
FtpRenameFileW
InternetReadFileExW
HttpQueryInfoW
GetUrlCacheConfigInfoW
CommitUrlCacheEntryA
InternetCrackUrlW
InternetLockRequestFile
advapi32
CryptHashSessionKey
InitiateSystemShutdownA
AbortSystemShutdownW
StartServiceW
LookupPrivilegeNameA
CryptEnumProvidersW
RegCloseKey
CryptContextAddRef
RegRestoreKeyW
CryptGetDefaultProviderW
CryptDuplicateHash
CreateServiceW
RegOpenKeyExW
CryptSetKeyParam
LookupAccountNameW
comdlg32
ChooseColorW
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
ChooseFontA
kernel32
FreeEnvironmentStringsW
GetModuleFileNameA
HeapFree
VirtualAlloc
LoadLibraryA
GetCurrentProcess
RemoveDirectoryA
GetCurrentThreadId
GetTickCount
InterlockedExchange
ReadFileEx
InterlockedIncrement
lstrcpyW
ExitProcess
TransactNamedPipe
lstrcat
QueryPerformanceCounter
TerminateProcess
GetWindowsDirectoryW
GetSystemTimeAsFileTime
MoveFileA
GetCurrentProcessId
GetProcAddress
HeapReAlloc
HeapAlloc
VirtualQuery
TryEnterCriticalSection
RtlUnwind
GetModuleHandleA
user32
LoadBitmapA
GetUpdateRgn
MonitorFromRect
GetComboBoxInfo
DlgDirSelectComboBoxExA
InsertMenuA
ArrangeIconicWindows
GetClassInfoExA
NotifyWinEvent
DialogBoxParamW
GetClassInfoW
SetWindowWord
SetCursorPos
TabbedTextOutW
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ