Static task
static1
Behavioral task
behavioral1
Sample
a3cb3d1dd392e1df079f263b9c653ee8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3cb3d1dd392e1df079f263b9c653ee8.exe
Resource
win10v2004-20240221-en
General
-
Target
a3cb3d1dd392e1df079f263b9c653ee8
-
Size
86KB
-
MD5
a3cb3d1dd392e1df079f263b9c653ee8
-
SHA1
6eb359dba0daebf7622b53fd3487c2de9efbe32a
-
SHA256
3a580880fc470b26272ca7f50ad08099e91a218b3011759e6b65443be6a163e4
-
SHA512
2541b10d3a25c355e260650a6b0a37d15dc3e1f238046b728dd0ebdf1f235c8700c6ba58817491a876902b5d9cbb2eac07a0fe068c639d86ae3d3148b02bff35
-
SSDEEP
1536:i13jUlJtCWSKY5Otreem8mCUVnn3CvnI2IGhyCIAustN23yyySAYZg00AyO6Q3:wIsWjY5OtdmCUZ3CvnphfxAqBAy2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3cb3d1dd392e1df079f263b9c653ee8
Files
-
a3cb3d1dd392e1df079f263b9c653ee8.exe windows:4 windows x86 arch:x86
f363007753ad26847759aa89407af277
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpQueryInfoA
InternetQueryDataAvailable
InternetOpenUrlA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
InternetOpenA
InternetSetOptionA
shlwapi
PathFileExistsA
PathGetDriveNumberA
snmpapi
SnmpUtilOidCpy
msvcrt
__CxxFrameHandler
??3@YAXPAX@Z
strncat
sprintf
??2@YAPAXI@Z
memmove
strncpy
_strdup
_strlwr
wcslen
_CxxThrowException
??1type_info@@UAE@XZ
_except_handler3
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
div
_adjust_fdiv
kernel32
TerminateProcess
GetStartupInfoA
CreateProcessA
GetComputerNameA
LocalFree
GetVersion
GetModuleHandleA
VirtualAlloc
VirtualFree
GetTempPathA
GetCurrentProcess
WideCharToMultiByte
WriteFile
DeviceIoControl
CloseHandle
InterlockedDecrement
lstrlenA
MultiByteToWideChar
GetModuleFileNameA
GetEnvironmentVariableA
SetLastError
GetLastError
CreateFileA
SetFilePointer
ReadFile
GetVolumeInformationA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
user32
CharToOemA
advapi32
GetUserNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
OleRun
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
VariantClear
GetErrorInfo
SysAllocString
SysFreeString
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@DABV10@@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
Sections
.text Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ