Static task
static1
Behavioral task
behavioral1
Sample
c3164455f16835dfe5055b0304fe2fc5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c3164455f16835dfe5055b0304fe2fc5.exe
Resource
win10v2004-20240226-en
General
-
Target
c3164455f16835dfe5055b0304fe2fc5
-
Size
10KB
-
MD5
c3164455f16835dfe5055b0304fe2fc5
-
SHA1
d6a9949dec13c798f4427fb4162f69685fd9eb41
-
SHA256
39b8e4472b70f14906459d83dba7a724fdde0d9ea2aa6d96a62df4cbed30a6c3
-
SHA512
7697b319eb897639896e2f481a4f718ee9aa58b5847354891aeac3bea93ebeffa7e812d616564acf0b35b7a7d7aa9e350ca35e73dfdde5695138ddabaea6f434
-
SSDEEP
192:obPGD6g9Vdpxrz3kk/K0fqttGA+sZvAE1/mW/8AoWE:obPGumdBz0aKNttGA+sZ4E1eW/8AoW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3164455f16835dfe5055b0304fe2fc5
Files
-
c3164455f16835dfe5055b0304fe2fc5.exe windows:4 windows x86 arch:x86
479cac110a224fd8bd9eae0a44ec61b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
OpenThread
Thread32First
GetCurrentProcess
DuplicateHandle
CreateFileA
GetProcAddress
LoadLibraryA
GetTempFileNameA
Sleep
CopyFileA
SuspendThread
GetSystemDirectoryA
GetPrivateProfileStringA
ExitProcess
WritePrivateProfileStringA
MoveFileExA
SetFileAttributesA
QueryPerformanceCounter
GetModuleFileNameA
GetWindowsDirectoryA
QueryPerformanceFrequency
CreateThread
Thread32Next
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
CloseHandle
GetTempPathA
lstrlenA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenProcessToken
msvcrt
strcmp
memset
strcat
strcpy
strrchr
atoi
_except_handler3
_stricmp
_itoa
shlwapi
PathAppendA
Sections
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ