Static task
static1
Behavioral task
behavioral1
Sample
a3a5ed0662cac816a7583ae402a0c9c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3a5ed0662cac816a7583ae402a0c9c2.exe
Resource
win10v2004-20240221-en
General
-
Target
a3a5ed0662cac816a7583ae402a0c9c2
-
Size
948KB
-
MD5
a3a5ed0662cac816a7583ae402a0c9c2
-
SHA1
786d0618928df0d3bd44457a6e1007a22a1492bd
-
SHA256
690d539399a1180ddd9a7eee5874c7a84ba16c2c5e5917bbd8fd9c497d936802
-
SHA512
38f12ab8c933b680a7c3572e66af3abf4baae943533f4399b25a8dc259d608ce515454db25abe08beaff1bd6782f577e47a6f8f4d21a8519382c5f6fe3f22478
-
SSDEEP
12288:cuGtjPVwgR3/1kfD4WFseCAyZBNVagtm092ZRABRtGvLWNgikC1SnYB8oymGULJu:cuGtjPVwc/3pelynagAdvBikCk8750
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3a5ed0662cac816a7583ae402a0c9c2
Files
-
a3a5ed0662cac816a7583ae402a0c9c2.exe windows:4 windows x86 arch:x86
9a506fc567a264315249e67c4d0bff1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
FindClose
GetFileAttributesA
GetEnvironmentStringsA
FreeEnvironmentStringsA
FreeLibrary
GetVersionExA
LoadLibraryA
GetProcAddress
GetLastError
GetTickCount
GetStartupInfoA
GetStdHandle
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleA
WriteFile
ReadFile
CloseHandle
DeleteFileA
SetFilePointer
CreateFileA
GetFileType
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetProcessHeap
HeapAlloc
HeapFree
TlsAlloc
TlsGetValue
TlsSetValue
CreateThread
ExitThread
GlobalAlloc
GlobalFree
Sleep
SuspendThread
ResumeThread
TerminateThread
WaitForSingleObject
SetThreadPriority
GetThreadPriority
CreateEventA
ResetEvent
SetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
ReadProcessMemory
SetUnhandledExceptionFilter
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
GetLocaleInfoA
GetProcAddress
GetLastError
WaitForSingleObject
FindClose
CloseHandle
GetThreadLocale
CreateProcessA
FindFirstFileA
GetExitCodeProcess
GetVersionExA
ExitProcess
GetShortPathNameA
user32
MessageBoxA
MessageBoxA
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 15KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ