Static task
static1
Behavioral task
behavioral1
Sample
3f637246f5063e42001e7fe4bf943345.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f637246f5063e42001e7fe4bf943345.exe
Resource
win10v2004-20231215-en
General
-
Target
3f637246f5063e42001e7fe4bf943345
-
Size
134KB
-
MD5
3f637246f5063e42001e7fe4bf943345
-
SHA1
3c23b21cb40a81f0b7206f1caaaf4495f5e6ab7b
-
SHA256
bd22c5e283b782d0a2874f4ec474ce759e1574f186ab8a47abb888c0334d142d
-
SHA512
5ed31236cb5817bb84055578a2d2398ca2f0a5d91ac3f301080c169e32636b50e53b81e0a50ab4df66abf31125fc24393c06de4f708793d9ae4f6c3b1a4a17c8
-
SSDEEP
3072:6ufsSBsVaBaSmdiIPnmyAwabC0Ky6cR5FpIx05b0EyPAjsOa1:62sS6VaBalh/nAwgCby6cR5v5b0EfG1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f637246f5063e42001e7fe4bf943345
Files
-
3f637246f5063e42001e7fe4bf943345.exe windows:5 windows x86 arch:x86
1044554111e469f734b8b67f6dbfbc82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
MultiByteToWideChar
GetSystemTimeAsFileTime
GetCurrentThreadId
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
ReadFile
Sleep
MultiByteToWideChar
CloseHandle
GetVersionExA
LocalAlloc
LocalAlloc
MultiByteToWideChar
CloseHandle
QueryPerformanceCounter
LeaveCriticalSection
GetCurrentProcessId
DisableThreadLibraryCalls
lstrlenA
GetLastError
GetModuleFileNameA
CloseHandle
MultiByteToWideChar
FreeLibrary
GetVersionExA
InterlockedDecrement
HeapAlloc
ReadFile
DeleteCriticalSection
GetModuleHandleW
EnterCriticalSection
Sleep
LocalFree
HeapAlloc
GetLastError
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
LoadLibraryW
CreateEventW
GetModuleFileNameA
lstrlenA
LoadLibraryW
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
MultiByteToWideChar
GetProcAddress
GetLastError
SetLastError
SetLastError
InterlockedDecrement
CreateFileW
GetCurrentProcessId
Sleep
InterlockedCompareExchange
CreateEventW
GetCurrentThreadId
CreateEventW
CreateThread
DeleteCriticalSection
InterlockedIncrement
Sleep
InterlockedDecrement
user32
SendDlgItemMessageW
PostMessageW
GetWindowRect
SetDlgItemTextW
LoadIconW
DefWindowProcW
IsWindow
TranslateMessage
LoadStringW
PostMessageW
DestroyWindow
SetTimer
KillTimer
EndDialog
GetParent
SetDlgItemTextW
KillTimer
GetSysColor
GetFocus
DestroyWindow
DefWindowProcW
BeginPaint
SetWindowTextW
CharNextW
GetWindowRect
PostMessageW
SetWindowLongW
SetWindowPos
LoadIconW
LoadStringW
EnableWindow
SetWindowLongW
CreateWindowExW
CharNextW
DefWindowProcW
PostMessageW
GetClientRect
SetWindowLongW
MessageBoxW
ShowWindow
EnableWindow
PostQuitMessage
GetParent
SetWindowLongW
SetDlgItemTextW
ShowWindow
DispatchMessageW
PostQuitMessage
InvalidateRect
TranslateMessage
LoadStringW
SetWindowLongW
GetFocus
BeginPaint
GetWindowLongW
SetWindowLongW
GetParent
TranslateMessage
KillTimer
DialogBoxParamW
TranslateMessage
wsprintfA
LoadIconW
GetParent
EndDialog
GetDesktopWindow
GetSystemMetrics
EndDialog
Sections
.text Size: 129KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE