Static task
static1
Behavioral task
behavioral1
Sample
3ffd385f7927f9e8cbedb85d54f71e05.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ffd385f7927f9e8cbedb85d54f71e05.exe
Resource
win10v2004-20231215-en
General
-
Target
3ffd385f7927f9e8cbedb85d54f71e05
-
Size
402KB
-
MD5
3ffd385f7927f9e8cbedb85d54f71e05
-
SHA1
9e873083a4e2d29e8c95e9807b05e03a7e6f1b1a
-
SHA256
37f0f9501329d891a0d42b9bf58408b16aef644ee7d5537fff8b3ec0c6a4eb3b
-
SHA512
5f8dd277549b7a6451b8b29856d2c3dcae5d5d80c929f6bcab3bad482f8896d32babeb8bfa220f05e1ff950ef93ec2967e2fd9097dfda63a0810a0fd4b7c5704
-
SSDEEP
12288:ycQguuDkj7W0sDqK5DKkKQgZULqvZEdRRRRR:5gueiJp2GWR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ffd385f7927f9e8cbedb85d54f71e05
Files
-
3ffd385f7927f9e8cbedb85d54f71e05.exe windows:4 windows x86 arch:x86
58da7289fc0e57e9969b549e468dee2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetTempPathA
LoadLibraryA
GlobalFree
VirtualAlloc
GlobalAlloc
GetFileSize
GetModuleHandleW
LocalAlloc
WriteFile
CreateFileA
SetFilePointer
ReadFile
FindClose
GetLastError
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
MapViewOfFile
FlushViewOfFile
CreateFileMappingA
CopyFileA
FreeResource
FindResourceExA
Sleep
GetProcAddress
SetLastError
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
GetStringTypeW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
CreateMutexA
VirtualFree
GetProcessHeap
HeapAlloc
ExitProcess
CreateThread
CloseHandle
HeapFree
WaitForMultipleObjects
VirtualProtect
GetStdHandle
user32
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
GetDC
PostQuitMessage
EndPaint
DrawTextA
GetClientRect
BeginPaint
DefWindowProcA
RegisterClassExA
GetIconInfo
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
IsWindow
IsWindowVisible
DrawIcon
CopyImage
ReleaseDC
DestroyIcon
CreateIconIndirect
CreateDialogParamA
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
LoadImageA
gdi32
CreatePen
SelectObject
DeleteObject
EnumObjects
CreateSolidBrush
CreateDCA
GetObjectA
GetDIBits
CreateCompatibleBitmap
Rectangle
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 549KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mss Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ems Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ead Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.exx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE