Static task
static1
Behavioral task
behavioral1
Sample
3eb23cd112df665f281ba855df348ff6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3eb23cd112df665f281ba855df348ff6.exe
Resource
win10v2004-20231215-en
General
-
Target
3eb23cd112df665f281ba855df348ff6
-
Size
60KB
-
MD5
3eb23cd112df665f281ba855df348ff6
-
SHA1
ecad120886c75d7ec87e2a8a248f5fcbe3a27167
-
SHA256
5ee0b7d4bc3bdd08cef44acdae17467ef33ec419f7859416a087db40888e34ae
-
SHA512
28825e55e5b846228e7efc3c80f10c2b8658fdcc79d3c8d17d0795ed54d84d8d32544c7b38e666d5c1c17b8b0b2100aaf9c322300a279a4ff53c32b8f350ee4f
-
SSDEEP
768:OB2rCbcxd8bhGhhHYZHoO7ydRSLTKz1XeswgN7I3nuHl/rts0J:QAxE2hWoOkdRXesh+2rtJJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eb23cd112df665f281ba855df348ff6
Files
-
3eb23cd112df665f281ba855df348ff6.exe windows:4 windows x86 arch:x86
2e24f6581bd653425c2356d16cd7da7b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessTimes
SystemTimeToFileTime
GetSystemTime
GetVersionExA
ReleaseMutex
GetLastError
CreateMutexA
CreateRemoteThread
GetExitCodeThread
WaitForSingleObject
GetModuleHandleA
OpenProcess
DuplicateHandle
GetCurrentProcess
VirtualFreeEx
VirtualAllocEx
WriteProcessMemory
CompareStringW
CompareStringA
ReadFile
SetEndOfFile
SetFilePointer
FreeLibrary
CloseHandle
LoadLibraryA
lstrlenA
GetProcAddress
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
CreateFileA
FlushFileBuffers
GetTimeZoneInformation
GetLocalTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
TerminateProcess
HeapAlloc
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
SetEnvironmentVariableA
user32
KillTimer
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
RegQueryInfoKeyA
RegEnumValueW
RegCloseKey
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
urlmon
UrlMkGetSessionOption
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ