@SetFirstEverVice@8
Static task
static1
Behavioral task
behavioral1
Sample
3e4ddca3a0d8b08f50b28d8983ecb80f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e4ddca3a0d8b08f50b28d8983ecb80f.exe
Resource
win10v2004-20231215-en
General
-
Target
3e4ddca3a0d8b08f50b28d8983ecb80f
-
Size
345KB
-
MD5
3e4ddca3a0d8b08f50b28d8983ecb80f
-
SHA1
9898808a0223846a4cf75549fe925368d0bf8f84
-
SHA256
61fe734407cc70105ccbe489e4a70a72f2aaa7591619a6338a34a2f7606bf0b6
-
SHA512
541db3bbeb7fd22e53a458754d39d2cd1d662f89829a777f5424320293d527e752ac40b71596002b662dde9fe7bae89e354b1d2f6d07602ff2e6e62a099a7bb8
-
SSDEEP
6144:Cw0rMMorByie/YL0LiSRGo62r4Wylezm9zRMqt/b:YyeAgLuLjWeeAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e4ddca3a0d8b08f50b28d8983ecb80f
Files
-
3e4ddca3a0d8b08f50b28d8983ecb80f.exe windows:5 windows x86 arch:x86
02fed18d5788c3d9bcc1897631bb2a01
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
WaitForSingleObject
GetSystemDefaultLCID
GetModuleHandleW
EnumCalendarInfoExW
SetThreadUILanguage
GetConsoleAliasesLengthA
GetConsoleTitleA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
SetVolumeMountPointA
lstrcpynW
SetConsoleCursorPosition
GetFileAttributesW
SetTimeZoneInformation
WriteConsoleW
IsBadWritePtr
GetMailslotInfo
lstrcatA
lstrlenW
FlushFileBuffers
InterlockedExchange
FillConsoleOutputCharacterW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
EnumDateFormatsExA
CreateTimerQueueTimer
LocalLock
EnterCriticalSection
GlobalGetAtomNameA
ResetEvent
GetLocalTime
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
SetFileApisToANSI
GetOEMCP
GetModuleHandleA
HeapSetInformation
GetCPInfoExA
FindFirstVolumeA
DeleteTimerQueueTimer
GetCurrentProcessId
GetConsoleProcessList
GetModuleFileNameW
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
HeapSize
GetCPInfo
GetACP
IsValidCodePage
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoW
Exports
Exports
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ