Static task
static1
Behavioral task
behavioral1
Sample
c3272a644a5e2a6a3eb52c5e52a33f3c.exe
Resource
win7-20240221-en
General
-
Target
c3272a644a5e2a6a3eb52c5e52a33f3c
-
Size
39KB
-
MD5
c3272a644a5e2a6a3eb52c5e52a33f3c
-
SHA1
d1ce0306631efa65c04a7ad77cc6948505e07f0e
-
SHA256
5113ed79b9b59d0baad266386d64f2f4be15afb2abaf65c7400c1084951b8dfc
-
SHA512
07ca038f54b7b0134c63ff6764050d59fe5e1b31ea81e651db092b88037f7ba8044c07834373648ed4a55016e43692203ab0f74567149f90fd75e87bea748dc9
-
SSDEEP
384:bXCaS9gY6vWZrdSDwIWNAAITIs0iiFQxUAAyJSr+8DccOz6Mv78nqhAJ+j:bXi6QkomMy/JS6iccG6MoJ+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3272a644a5e2a6a3eb52c5e52a33f3c
Files
-
c3272a644a5e2a6a3eb52c5e52a33f3c.exe windows:4 windows x86 arch:x86
8f1516f32d188b0b5f6b5c7961123637
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ToAscii
SetWindowsHookExA
SendMessageA
RegisterHotKey
MessageBoxA
MapVirtualKeyA
GetWindowTextA
UnhookWindowsHookEx
GetKeyboardState
GetKeyState
GetKeyNameTextA
CallNextHookEx
EnumChildWindows
GetClassNameA
GetForegroundWindow
GetMessageA
kernel32
CreateFileA
GetFileSize
GlobalAlloc
GetTickCount
lstrlenA
lstrcatA
Sleep
RtlZeroMemory
RtlMoveMemory
ReleaseMutex
OpenMutexA
GlobalFree
ReadFile
GetModuleHandleA
CloseHandle
CreateMutexA
CreateThread
ExitProcess
ExpandEnvironmentStringsA
FindFirstFileA
GetLastError
advapi32
GetUserNameA
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
InternetOpenUrlA
shell32
ShellExecuteA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE