Static task
static1
Behavioral task
behavioral1
Sample
3f85e0ef3ceb1b9d6be9e954a27fe02c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f85e0ef3ceb1b9d6be9e954a27fe02c.exe
Resource
win10v2004-20231215-en
General
-
Target
3f85e0ef3ceb1b9d6be9e954a27fe02c
-
Size
464KB
-
MD5
3f85e0ef3ceb1b9d6be9e954a27fe02c
-
SHA1
5792dcbd78e67738d727d246fc7c5f3e0292ccce
-
SHA256
c24640cd8167f16e06a54e768bb623423c2c5d42f2caef72d56f8304e0584ebc
-
SHA512
5694099ca8cfb8a87bd6ab023a7344f9ba604d26622c6b0d95e65208890f83076aff43f69a32190336fb4ec9dc8e362e68b7e7d6c48b7c526802f158163a2df2
-
SSDEEP
3072:PHLvEfDN9N+UMoNqhdfT1eurSXuuWVjBufHzZuLXoTOiQS:PHTEbLN0heuEq0/ULSQS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f85e0ef3ceb1b9d6be9e954a27fe02c
Files
-
3f85e0ef3ceb1b9d6be9e954a27fe02c.exe windows:0 windows x86 arch:x86
bc9d73513fade031d557842dacd9c2ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocateUserPhysicalPages
AttachConsole
Beep
BeginUpdateResourceA
CallNamedPipeA
CloseHandle
CloseProfileUserMapping
ConvertFiberToThread
CopyFileA
CopyFileW
CreateDirectoryA
CreateFileA
CreateFileMappingW
CreateFileW
CreateJobSet
CreateProcessA
CreateWaitableTimerA
DeleteCriticalSection
DeleteFiber
DeviceIoControl
DosDateTimeToFileTime
EnumCalendarInfoW
EnumLanguageGroupLocalesW
EraseTape
ExitVDM
ExtendVirtualBuffer
FillConsoleOutputCharacterW
FindActCtxSectionGuid
FindCloseChangeNotification
FindFirstFileExA
FindFirstVolumeMountPointW
FindResourceExA
FreeEnvironmentStringsW
GetCPInfo
GetComputerNameExA
GetComputerNameExW
GetConsoleAliasesW
GetConsoleCommandHistoryLengthW
GetConsoleDisplayMode
GetConsoleFontInfo
GetConsoleInputWaitHandle
GetConsoleProcessList
GetCurrencyFormatW
GetDateFormatA
GetDateFormatW
GetDefaultSortkeySize
GetDevicePowerState
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetExpandedNameA
GetFileAttributesExA
GetLargestConsoleWindowSize
GetLogicalDriveStringsA
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumaProcessorNode
GetNumberOfConsoleMouseButtons
GetOverlappedResult
GetPriorityClass
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetProcessVersion
GetProcessWorkingSetSize
GetProfileIntW
GetProfileSectionA
GetProfileSectionW
GetQueuedCompletionStatus
GetTapeStatus
GetTempPathA
GetUserDefaultLangID
GetVolumeInformationW
GlobalGetAtomNameW
GlobalHandle
GlobalWire
HeapReAlloc
HeapSetInformation
HeapValidate
InitializeCriticalSection
InterlockedPushEntrySList
IsDBCSLeadByte
IsValidCodePage
LZSeek
LoadLibraryA
LocalHandle
MapUserPhysicalPagesScatter
MapViewOfFile
OpenJobObjectW
OpenProcess
PurgeComm
QueryMemoryResourceNotification
ReadFile
RegisterConsoleVDM
RemoveDirectoryA
ReplaceFileA
RequestDeviceWakeup
ResumeThread
RtlMoveMemory
SetCalendarInfoA
SetComPlusPackageInstallStatus
SetCommBreak
SetCommState
SetCommTimeouts
SetComputerNameExA
SetComputerNameW
SetConsoleCommandHistoryMode
SetConsoleCursor
SetConsoleCursorInfo
SetConsoleMenuClose
SetConsoleNumberOfCommandsA
SetConsoleOutputCP
SetConsoleTextAttribute
SetConsoleWindowInfo
SetCurrentDirectoryA
SetDllDirectoryW
SetLocalTime
SetMessageWaitingIndicator
SetSystemTime
SetTapeParameters
SetTapePosition
SetThreadIdealProcessor
SetVDMCurrentDirectories
SetVolumeLabelW
SwitchToThread
TerminateProcess
Thread32First
Thread32Next
TransactNamedPipe
TryEnterCriticalSection
UnhandledExceptionFilter
VDMOperationStarted
VerLanguageNameW
VirtualQuery
VirtualQueryEx
WritePrivateProfileSectionW
WriteTapemark
_hwrite
lstrcmpi
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ