Static task
static1
Behavioral task
behavioral1
Sample
3ffd906ae97c10705ca0e33e46274c09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ffd906ae97c10705ca0e33e46274c09.exe
Resource
win10v2004-20231215-en
General
-
Target
3ffd906ae97c10705ca0e33e46274c09
-
Size
121KB
-
MD5
3ffd906ae97c10705ca0e33e46274c09
-
SHA1
3cb084219ee022ab53d1854c04070e057dda1c7e
-
SHA256
5f839d64f19c2a05b2de68227400a3747eec1f517abd0d9ddbb164d7f591ee43
-
SHA512
08cce4b55fc2fc5c65fccff515b2c927e00cdd029455ce8f61eb2bb320aef36a360a2b9cc703d624694ac6d2c0be132079f7be17973a71c5926ccdaeecf42b80
-
SSDEEP
1536:81koYuv0Sta8Xv2LraZYHDzc1AgZ65zIP/J8x/iC5ul:9u15XvcuiHgci2qC5u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ffd906ae97c10705ca0e33e46274c09
Files
-
3ffd906ae97c10705ca0e33e46274c09.exe windows:5 windows x86 arch:x86
5aa2d3fad5fc7353fbb0e181d20b4221
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnlockFile
SetFileAttributesA
CreateFileA
CopyFileA
GetWindowsDirectoryA
LockFile
Sleep
DeleteFileA
GetLogicalDrives
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetLastError
HeapFree
RtlUnwind
GetCommandLineA
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
LoadLibraryA
GetLocaleInfoW
CreateFileW
SetEndOfFile
GetProcessHeap
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE