Static task
static1
Behavioral task
behavioral1
Sample
a3975f2fe149689669555d86b873e389.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a3975f2fe149689669555d86b873e389.exe
Resource
win10v2004-20240221-en
General
-
Target
a3975f2fe149689669555d86b873e389
-
Size
75KB
-
MD5
a3975f2fe149689669555d86b873e389
-
SHA1
607d0c966ae5d7f9f9f5fa68796dc04c615bd341
-
SHA256
45c8fa72042ca1495ead0cf7154f83af125b805cbf8030b912e64b35d953fdf0
-
SHA512
7d4c440befa6f4a471093623c0f4b72877d9ae872a62e96a38aa1051ccaa2439c6c45b0ba92f1d0bbd59cc386d85307916aa795d39b7ddb9d8e18241ed40142e
-
SSDEEP
768:mcXgEsi1TwRDCaI3lhjtDw/XZd9KbjobhOm8eQYMFCPQFOs4TUyv41:mqgEsYTwtCVwvNKH2hFztQtWUN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3975f2fe149689669555d86b873e389
Files
-
a3975f2fe149689669555d86b873e389.exe windows:4 windows x86 arch:x86
14e0e0e568518ba9a7b2408b1e60d7e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
CloseHandle
LocalFree
ReleaseMutex
FindAtomW
GetModuleHandleA
CreateFileA
GetTickCount
CreateThread
HeapCreate
LoadLibraryW
GetFileAttributesW
GetSystemTime
GetDiskFreeSpaceW
SetEvent
GetComputerNameA
SetLastError
ResetEvent
lstrcmpiW
ResumeThread
user32
CloseWindow
SetFocus
GetDlgItem
CallWindowProcA
GetComboBoxInfo
GetKeyState
CreateWindowExA
GetClassInfoA
DrawStateA
DispatchMessageA
DestroyCaret
GetClipCursor
FillRect
MessageBoxA
cryptdlg
DecodeRecipientID
CertTrustFinalPolicy
CertTrustInit
CertTrustCertPolicy
CertConfigureTrustA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE