Static task
static1
Behavioral task
behavioral1
Sample
3f91dc9cfc6bf776dd2e50a11d7852c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f91dc9cfc6bf776dd2e50a11d7852c4.exe
Resource
win10v2004-20231215-en
General
-
Target
3f91dc9cfc6bf776dd2e50a11d7852c4
-
Size
1.2MB
-
MD5
3f91dc9cfc6bf776dd2e50a11d7852c4
-
SHA1
be69eb00b8eb16ad25ab3ab34aeac221842f9aef
-
SHA256
bd9fb9d7e91200cd9fa678c0e792020966f2b5bd1f2a0882b0a5cc9265b4f325
-
SHA512
bd33190f6c52c4d392bef1549f30e663e936a827482a9b329f1b01d44e4b3d63c1eaa885729b69d8b336f993b92fc0b6c84e81dedac7e27a74e5e9f5b30dc4ad
-
SSDEEP
24576:egN+aewsAjdHF8z3j5D7JaT+KVvrSrtUx/:egHljdHF+3j5D78OBUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f91dc9cfc6bf776dd2e50a11d7852c4
Files
-
3f91dc9cfc6bf776dd2e50a11d7852c4.exe windows:5 windows x64 arch:x64
1bd67dd8504dbae818abb397bad318ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcr100
fgets
fopen
?terminate@@YAXXZ
__C_specific_handler
_amsg_exit
__getmainargs
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
strtok
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
_unlock
__dllonexit
_lock
_onexit
fseek
fclose
strstr
getenv
memcpy
_vsnprintf_s
_ftime64_s
strftime
_snprintf_s
_localtime64
_wstat64i32
strcat_s
memcpy_s
_splitpath_s
strcpy_s
atoi
sprintf_s
??_V@YAXPEAX@Z
sscanf
__argv
__argc
_putenv
sprintf
__CxxFrameHandler3
memmove
??0exception@std@@QEAA@AEBV01@@Z
_CxxThrowException
??2@YAPEAX_K@Z
free
printf
_stat64i32
_snprintf
??_U@YAPEAX_K@Z
_time64
??3@YAXPEAX@Z
??1exception@std@@UEAA@XZ
?what@exception@std@@UEBAPEBDXZ
??0exception@std@@QEAA@AEBQEBD@Z
_mbslwr
_mbsstr
_mbsrchr
_mbsnbcpy
_mbsnbcpy_s
_mbschr
strrchr
memset
calloc
_strdup
_mbsnbcmp
_mbsicmp
_initterm
_mbscmp
malloc
kernel32
MultiByteToWideChar
FreeLibrary
RaiseException
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
EncodePointer
GetStartupInfoW
Sleep
lstrcpynA
WideCharToMultiByte
lstrcmpiA
GetSystemWindowsDirectoryA
GetFileAttributesA
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
GetShortPathNameA
GetLongPathNameA
FormatMessageA
LocalAlloc
lstrlenA
CreateProcessA
GetSystemDirectoryA
LoadLibraryA
CreateFileA
CloseHandle
GetNativeSystemInfo
GetCurrentProcess
GetVersionExA
GlobalMemoryStatusEx
GetModuleHandleA
GetProcAddress
WaitForSingleObject
lstrcpyA
GetWindowsDirectoryA
FindFirstFileA
GetModuleFileNameA
FindClose
GetEnvironmentVariableA
GetLastError
LocalFree
user32
wsprintfA
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
SysAllocString
SysStringLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ