Static task
static1
Behavioral task
behavioral1
Sample
a3c0a404c26720d7ba288f7ab770ff15.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3c0a404c26720d7ba288f7ab770ff15.exe
Resource
win10v2004-20240221-en
General
-
Target
a3c0a404c26720d7ba288f7ab770ff15
-
Size
21KB
-
MD5
a3c0a404c26720d7ba288f7ab770ff15
-
SHA1
28a9f2b9fc16260cdd3382f9c6999bc813d645be
-
SHA256
97d5be67d63f827af160e919a82630b7d591f64353952fea65292dc09f5442d3
-
SHA512
a3eea678c1e03244f5d5db0dc75233804e78c5019904ae71227cf00d6cc7166e7f93dd9b0553130d1dd09ac80842a5758e503c625177e3ac5f0e0697c54ce731
-
SSDEEP
384:yFakajzlHfqPFpeJTPVDmVa+H9DBD/YY0Xyw9Lo:yFarVHfoGJTPNf+B1wYIyw9Lo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3c0a404c26720d7ba288f7ab770ff15
Files
-
a3c0a404c26720d7ba288f7ab770ff15.exe windows:4 windows x86 arch:x86
39f43a83cde8674b9fe64a9cfdd03553
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
strncmp
strstr
strchr
atoi
strncpy
RtlRandom
sprintf
memset
_chkstk
kernel32
GetLastError
GetSystemTime
CloseHandle
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
CreateFileA
SetFilePointer
SystemTimeToFileTime
GetCurrentProcess
VirtualFree
GetWindowsDirectoryA
WriteFile
Sleep
TerminateProcess
ReadFile
GetSystemDirectoryA
GetTimeZoneInformation
SetCurrentDirectoryA
VirtualAlloc
GetProcAddress
wininet
InternetConnectA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE