Static task
static1
Behavioral task
behavioral1
Sample
3f33b46172805b5d2e83cde60043c6c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f33b46172805b5d2e83cde60043c6c7.exe
Resource
win10v2004-20231215-en
General
-
Target
3f33b46172805b5d2e83cde60043c6c7
-
Size
21KB
-
MD5
3f33b46172805b5d2e83cde60043c6c7
-
SHA1
903e4d1e696cdc43c99bb60435e3e80987280fdd
-
SHA256
35e6ccb2461f6b1e1d57b58546c1250ccb21952934f243dfa2902001198256d7
-
SHA512
e0f5bb7b1121d0c9f65dd5c3901667935b7c0e23c340d0899696aad864a657ce79d41af0ad3b7cc74982ad81595a6dbb9b0445c0a5404eea75a924d23a4afebc
-
SSDEEP
384:CEv9oXTIrH0KBFCf5NETcheZeu1/vw7lcRBi9wHAE:C49/HxgaeEvw7QBi3E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f33b46172805b5d2e83cde60043c6c7
Files
-
3f33b46172805b5d2e83cde60043c6c7.exe windows:6 windows x86 arch:x86
73372f589666d67e6202a29d0f895d7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegCloseKey
kernel32
MultiByteToWideChar
LocalAlloc
LocalFree
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
DeleteFileA
GetSystemDirectoryA
ReadFile
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
__getmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
memset
memcpy
malloc
free
?terminate@@YAXXZ
_controlfp
isleadbyte
_snprintf
_itoa
wctomb
__badioinfo
__pioinfo
_fileno
_lseeki64
_write
_isatty
_iob
_errno
??2@YAPAXI@Z
??3@YAXPAX@Z
__setusermatherr
rpcrt4
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcStringFreeW
RpcBindingSetAuthInfoExW
NdrClientCall2
shell32
ShellExecuteA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ