Static task
static1
Behavioral task
behavioral1
Sample
3f140942df2a21a49406344d6c4dd2dd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f140942df2a21a49406344d6c4dd2dd.exe
Resource
win10v2004-20231215-en
General
-
Target
3f140942df2a21a49406344d6c4dd2dd.bin
-
Size
79KB
-
MD5
3f140942df2a21a49406344d6c4dd2dd
-
SHA1
77ed54a0668ee36b3d2e07a1063ca5165933773b
-
SHA256
d473e9df205832ad89192102e77217292dc4459f1de6d895aae0b9a5c38a8b94
-
SHA512
7ef283c085e02b947ad8698888964d2cf96b80f08d3823b1a173487ff2072eb8d182a64ef03459a12fb77a53a7f81746ab2e83ce9858994894f20b2bd548c8ee
-
SSDEEP
768:8r7M+i+4s+rMZBXUeAqb5pk6wI/RDw4pVCugE1rUKZLQzr54+5DS/sIclVF1/7EM:JwKe1g5e/sIcfH3iWejp2TDH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f140942df2a21a49406344d6c4dd2dd.bin
Files
-
3f140942df2a21a49406344d6c4dd2dd.bin.exe windows:5 windows x86 arch:x86
e9c13585a8aee60e318f97b1ef73ddc1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
WriteFile
CopyFileExA
GlobalFree
DeleteFileA
GetFileTime
CompareStringA
HeapAlloc
FindClose
FlushFileBuffers
GetFileType
lstrlenA
ExitProcess
GetStdHandle
GetCommandLineA
HeapFree
OpenFile
ReadFile
CopyFileA
GetLastError
user32
CopyRect
DrawTextW
GetDlgItem
IsWindow
CopyImage
DrawIcon
advapi32
RegCreateKeyA
RegFlushKey
RegOpenKeyExW
RegGetKeySecurity
RegEnumKeyExA
RegDeleteKeyW
Sections
.437b Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.db14 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.d1644 Size: 40KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.h8hh Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ