Static task
static1
Behavioral task
behavioral1
Sample
c3c06b590884c64c67212ad4d8ca9eaa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3c06b590884c64c67212ad4d8ca9eaa.exe
Resource
win10v2004-20240226-en
General
-
Target
c3c06b590884c64c67212ad4d8ca9eaa
-
Size
516KB
-
MD5
c3c06b590884c64c67212ad4d8ca9eaa
-
SHA1
a926927795fdf5d0b83705e92ebe20a8d3614838
-
SHA256
b42e71dbeef2b9703bc73e463d75fda460d5453d913a9961f7439233ba9a6913
-
SHA512
ef17246086018bd57a5488e68b522636a8dada2b38c4e0be7673d8cb4114e3dc60fa7d6f99aa70de53e7269313629d6a304947588a45175ede53000d97e1f947
-
SSDEEP
12288:LhEuz+u39LUjnKlL3uNqHxvd3KvPp/QW:LOi+u3pUjC3gqRovPpY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3c06b590884c64c67212ad4d8ca9eaa
Files
-
c3c06b590884c64c67212ad4d8ca9eaa.exe windows:4 windows x86 arch:x86
71a0ef53d9745eb0c987c1caf4faf45a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RealChildWindowFromPoint
RegisterClassExA
EnumDesktopsA
EnumDesktopWindows
GetUpdateRect
MsgWaitForMultipleObjectsEx
SetProcessDefaultLayout
SetTimer
SetMenu
IsWindowEnabled
MapVirtualKeyA
VkKeyScanExW
RegisterClassA
LoadCursorFromFileW
GetWindowThreadProcessId
CharUpperBuffW
DialogBoxParamW
GetKeyboardLayoutNameW
GetMenuItemInfoA
CallWindowProcW
TranslateAcceleratorW
InvertRect
CheckMenuRadioItem
SetCapture
GetDC
DestroyCursor
DlgDirSelectExA
comctl32
InitCommonControlsEx
kernel32
GetLastError
CreateFileMappingW
GetSystemTimeAsFileTime
LeaveCriticalSection
GetTimeZoneInformation
IsValidLocale
GetLocalTime
SetLastError
FlushFileBuffers
HeapAlloc
GetStdHandle
LCMapStringW
SetEnvironmentVariableA
FreeEnvironmentStringsA
FindNextFileA
InitializeCriticalSection
GetProcAddress
SetFilePointer
GetSystemTime
GetTickCount
GetStartupInfoA
CompareStringA
WideCharToMultiByte
HeapCreate
OpenMutexA
CreateNamedPipeW
WriteFile
TlsAlloc
GetEnvironmentStrings
GetModuleFileNameA
HeapDestroy
GetFileType
GetPrivateProfileIntW
InterlockedExchange
HeapFree
LCMapStringA
GetCommandLineA
RtlUnwind
GetACP
GetEnvironmentStringsW
TlsFree
MultiByteToWideChar
CloseHandle
FreeEnvironmentStringsW
GetCurrentThreadId
GetModuleHandleA
GetCurrentThread
GetCommandLineW
SetHandleCount
ExitProcess
ReadFile
InterlockedIncrement
QueryPerformanceCounter
WriteProfileSectionW
InterlockedDecrement
CreateMutexA
GetVersion
GetCurrentProcessId
TerminateProcess
CompareStringW
TlsSetValue
GetCPInfo
TlsGetValue
GetCurrentProcess
SetStdHandle
UnhandledExceptionFilter
EnterCriticalSection
VirtualQuery
GetStringTypeA
DeleteCriticalSection
LoadLibraryA
GetOEMCP
GetStringTypeW
VirtualFree
VirtualAlloc
IsBadWritePtr
EnumCalendarInfoExA
HeapReAlloc
Sections
.text Size: 189KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 314KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ