Static task
static1
Behavioral task
behavioral1
Sample
c3ad90f88044f3571d1437e870c479d6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3ad90f88044f3571d1437e870c479d6.exe
Resource
win10v2004-20240226-en
General
-
Target
c3ad90f88044f3571d1437e870c479d6
-
Size
2.6MB
-
MD5
c3ad90f88044f3571d1437e870c479d6
-
SHA1
ecba319014406525241f090a4600c3285907d802
-
SHA256
1afec367f085f5f796f313aec90f4a8803810b5af0a51e58914b02cb7441e69f
-
SHA512
d4ed1250bc6591df7b5b62b84ca97eeac4d4aeb130bfb0f22af3c1c93b19fd1cff9df42b1720342aa9e58cccf07187747b337724d6891d6f5ae3883fb31d9378
-
SSDEEP
49152:BGsgPJLB2r4vLMoROjiH602ci1ubu50mCLu/SQJIPH/qDQEmhOz06Kf:JgPJLn5RQK60fiQbCnCxPHX+0Bf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3ad90f88044f3571d1437e870c479d6
Files
-
c3ad90f88044f3571d1437e870c479d6.exe windows:4 windows x86 arch:x86
46d3d6733ef20e93007733042820288f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
GetTokenInformation
GetUserNameA
LockServiceDatabase
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegisterServiceCtrlHandlerA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeviceIoControl
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesA
GetLastError
GetModuleHandleA
GetOEMCP
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetPrivateProfileStructA
GetProcessHeap
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalUnlock
HeapAlloc
HeapDestroy
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
InterlockedIncrement
IsValidCodePage
LCMapStringA
LockResource
MoveFileA
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
SetPriorityClass
SetThreadPriority
Sleep
TlsFree
UnhandledExceptionFilter
VirtualAlloc
VirtualProtect
VirtualQuery
WritePrivateProfileStringA
lstrcpyA
lstrlenA
ole32
CoFreeUnusedLibraries
CoRegisterClassObject
CreateOleAdviseHolder
OleRegEnumVerbs
user32
CharNextA
CharPrevA
CheckRadioButton
CreateWindowExA
EndDialog
ExitWindowsEx
FindWindowA
GetAsyncKeyState
GetCapture
GetClassNameA
GetDesktopWindow
GetFocus
GetMenuItemCount
GetSystemMenu
GetWindow
GetWindowLongA
GetWindowPlacement
GetWindowRect
IsChild
IsDlgButtonChecked
KillTimer
LoadCursorA
MessageBoxA
MsgWaitForMultipleObjects
RegisterClassExA
SendMessageA
SetMenu
SetRect
ShowWindow
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 657KB - Virtual size: 660KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ