Static task
static1
Behavioral task
behavioral1
Sample
b3eab71ad701ef5b16ded619eb71d9c263c7e25e98cfa13d8e956a218adb97ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b3eab71ad701ef5b16ded619eb71d9c263c7e25e98cfa13d8e956a218adb97ae.exe
Resource
win10-20231215-en
General
-
Target
b3eab71ad701ef5b16ded619eb71d9c263c7e25e98cfa13d8e956a218adb97ae
-
Size
296KB
-
MD5
974742e6d26a9cb8689e3c7d872e6a59
-
SHA1
13b7e7f2d52f819431ab36215d5e180d3018b7fc
-
SHA256
b3eab71ad701ef5b16ded619eb71d9c263c7e25e98cfa13d8e956a218adb97ae
-
SHA512
b562a3e67271be03f90964c2398529a42c4d3b6e2a71bb1b69d38c400afb4853277aa1a2a6efadd235039c5c54591d994bf051ca9618cace839d841c372b2dbf
-
SSDEEP
3072:Hh66nlJRQ+xqBQ50qibQh9SeyviuoX/5IW61+HoX5U6krQpQvPuv8+1nlmMB:BTjG+xqmLhEeuiuoXiW61+Ho0WQvVws
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3eab71ad701ef5b16ded619eb71d9c263c7e25e98cfa13d8e956a218adb97ae
Files
-
b3eab71ad701ef5b16ded619eb71d9c263c7e25e98cfa13d8e956a218adb97ae.exe windows:5 windows x86 arch:x86
b0570b42c274fa99648c2e4196fed327
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumDateFormatsExW
GetModuleHandleExA
GetLocaleInfoA
FindResourceW
HeapAlloc
InterlockedIncrement
MoveFileExW
OpenJobObjectA
CreateDirectoryW
FreeEnvironmentStringsA
GetTickCount
GetProcessHeap
WriteFile
TzSpecificLocalTimeToSystemTime
GetSystemTimes
WideCharToMultiByte
GetVolumeInformationA
LoadLibraryW
GetConsoleAliasesLengthW
CompareStringW
GetStartupInfoW
WritePrivateProfileStringW
GetConsoleAliasesW
GlobalUnfix
GetLastError
GetProcAddress
CreateNamedPipeA
OpenWaitableTimerA
LoadLibraryA
LocalAlloc
SetCurrentDirectoryW
GetCurrentDirectoryA
EndUpdateResourceA
LocalFileTimeToFileTime
IsValidLocale
EnumSystemLocalesA
SetDefaultCommConfigA
GetAtomNameW
PulseEvent
HeapFree
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
Sleep
HeapSize
GetModuleHandleW
ExitProcess
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
GetUserDefaultLCID
RaiseException
user32
DestroyIcon
advapi32
DuplicateToken
ReadEventLogA
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xaz Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.juj Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ