Static task
static1
Behavioral task
behavioral1
Sample
c3ad5acf2924d73b711684da8dcc1e2a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c3ad5acf2924d73b711684da8dcc1e2a.exe
Resource
win10v2004-20240226-en
General
-
Target
c3ad5acf2924d73b711684da8dcc1e2a
-
Size
43KB
-
MD5
c3ad5acf2924d73b711684da8dcc1e2a
-
SHA1
bb5856050e0e6b740c23b38f72f1a7c23d186b1f
-
SHA256
b049095665feef630dd7b33c768e6b2be87440867165d687f631ceeec71418ba
-
SHA512
3774a157752b4be761ed0577de4cbf96d4d49652400e9e7f2f3bf4b2a4d21b6e7a4e74194fb9aad05f06c0869ddcf58cf33d85a015a81885b4be08f1bc109114
-
SSDEEP
768:Pep9Rw7dVj1X+QdC8TSODjCXWJ3qArSGfg/0do89IimHamregqV94zd:3ZCQ0ajCXmqAe+g/N89E6mrZ+94
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3ad5acf2924d73b711684da8dcc1e2a
Files
-
c3ad5acf2924d73b711684da8dcc1e2a.exe windows:4 windows x86 arch:x86
29a1dd7e2f4926a78f228db9959795c6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
CreateEventA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
GetCommandLineA
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentVariableA
GetExitCodeProcess
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStdHandle
GetTempFileNameA
GetTempPathA
GetVersionExA
GetWindowsDirectoryA
HeapDestroy
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryExA
LoadResource
Module32First
MoveFileExA
OpenEventA
QueryPerformanceCounter
RaiseException
ReadProcessMemory
RtlUnwind
SetEnvironmentVariableA
SetErrorMode
SetFilePointer
SetThreadPriority
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
VirtualAlloc
lstrcpyA
user32
DrawFocusRect
GetCursorPos
GetSystemMenu
IsDlgButtonChecked
MessageBeep
SendMessageA
UnhookWindowsHookEx
advapi32
AllocateAndInitializeSid
ChangeServiceConfig2A
CreateServiceA
LockServiceDatabase
OpenProcessToken
QueryServiceStatus
RegCloseKey
RegFlushKey
RegOpenKeyExA
UnlockServiceDatabase
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DATA Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ