Static task
static1
Behavioral task
behavioral1
Sample
ac3e3a814720d32736db350402bcf820.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac3e3a814720d32736db350402bcf820.exe
Resource
win10v2004-20240226-en
General
-
Target
ac3e3a814720d32736db350402bcf820
-
Size
80KB
-
MD5
ac3e3a814720d32736db350402bcf820
-
SHA1
dca0d2c3de3bb6b1aec73366de9d199093e64bf9
-
SHA256
b34c5d89b79a2a2eb95c26f5c9296782dae3ea30822389ed00baf515f985321d
-
SHA512
097ae6ec5846119b18cd4887a9daffe1a2643031d62a41e9024be6284f5a9e39f1ad42bdf72572e3c29b84869ec6d384dae92d0036b9c3e1c25cffe533252eba
-
SSDEEP
1536:Jyj0tEldXwc8mkr2NQrQqHn6CuPfkapAbXgtOwtvQ+IW7C2iaZ4dzlZYUqfsymtQ:Jyj0tKic8mkr2NQrQqH6CuPsapAbXgt7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac3e3a814720d32736db350402bcf820
Files
-
ac3e3a814720d32736db350402bcf820.exe windows:1 windows x86 arch:x86
21ac4bce43e9a87fda2f69b48c23c094
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
winmm
mciSendStringA
kernel32
DeleteFileA
DuplicateHandle
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDateFormatA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
CloseHandle
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
LoadLibraryA
CopyFileA
MapViewOfFile
MoveFileA
OpenProcess
PeekNamedPipe
CreateDirectoryA
ReadFile
RtlUnwind
CreateFileA
SetFileAttributesA
CreateFileMappingA
SetFilePointer
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
WriteFile
CreateMutexA
lstrcpyA
lstrcpynA
lstrlenA
CreatePipe
CreateProcessA
CreateThread
user32
GetWindowTextA
FindWindowA
GetForegroundWindow
GetKeyState
GetAsyncKeyState
MapVirtualKeyA
ExitWindowsEx
wsprintfA
CharUpperBuffA
SendMessageA
CharToOemA
keybd_event
advapi32
GetUserNameA
RegDeleteValueA
RegCreateKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ws2_32
ntohs
WSACleanup
listen
ioctlsocket
inet_ntoa
inet_addr
htons
htonl
getsockname
socket
getpeername
gethostbyname
gethostbyaddr
connect
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
send
select
WSAGetLastError
recv
crtdll
_iob
_itoa
__GetMainArgs
remove
_sleep
_strnicmp
atoi
exit
fclose
fopen
fputc
fputs
fread
fwrite
localeconv
malloc
mbstowcs
memcpy
memmove
memset
pow
raise
rand
signal
srand
strcat
strchr
strcmp
strncmp
strncpy
strstr
strtok
strtol
wcslen
wctomb
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 108KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE