Static task
static1
Behavioral task
behavioral1
Sample
c3dc64c95174787e924fb49d71e19459.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3dc64c95174787e924fb49d71e19459.exe
Resource
win10v2004-20231215-en
General
-
Target
c3dc64c95174787e924fb49d71e19459
-
Size
144KB
-
MD5
c3dc64c95174787e924fb49d71e19459
-
SHA1
94bfd43c816ad7484dad368f559f48c6b45508e0
-
SHA256
6a8c59189b9668756cc1cbb849f577b0332443a216410a9c87e627c36c13fbd7
-
SHA512
8e0289fcfe96664b6f97c8df03012e5ed1e57227650b8b519e8f98f89df8c9e2f3b09f2faf75655c7b5695d90373d68ea4f6caae749bf96526a848818fb2aa6c
-
SSDEEP
768:klw1DeIXKwAtYXjNQsZ7p3O+cx/kT14MnDeFPvUWejcWAwL3IGH:klwJevNuXj7nDYYSR3ejFLPH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3dc64c95174787e924fb49d71e19459
Files
-
c3dc64c95174787e924fb49d71e19459.exe windows:4 windows x86 arch:x86
d59f270cc596ec94b33b9fd5c9db78d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord757
ord605
ord587
ord741
ord715
ord2020
ord1054
ord3641
ord5182
ord4212
ord4735
ord4890
ord4580
ord1671
ord1670
ord1551
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord923
ord928
ord932
ord930
ord934
ord2410
ord2394
ord2413
ord5382
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord354
ord2168
ord4104
ord1482
ord1084
ord2371
ord1903
ord2095
ord1591
ord5915
ord1402
ord4240
ord5214
ord2991
ord3317
ord572
ord2086
ord1545
ord4232
ord3164
ord1063
ord1643
ord1581
ord3292
ord762
ord1794
ord304
ord3934
ord4035
ord4749
ord709
ord501
ord2164
ord2657
ord5807
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord6219
ord5102
ord912
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord4541
ord1024
ord384
ord5529
ord5563
ord781
ord5089
ord629
ord6288
ord1439
ord764
ord380
ord310
ord784
ord3201
ord2703
ord5493
ord2933
ord299
ord6118
ord2902
ord876
ord1489
ord297
ord2408
ord578
ord1207
msvcr71
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
memset
puts
_except_handler3
free
sprintf
time
srand
rand
strrchr
atol
_time64
ceil
vsprintf
__CxxFrameHandler
_setmbcp
_localtime64
_controlfp
kernel32
GetTempFileNameA
GetVersionExA
GetModuleFileNameA
WideCharToMultiByte
GetCommandLineW
Sleep
DeleteFileA
WaitForSingleObject
CreateProcessA
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLastError
user32
ShowWindow
LoadIconA
GetSystemMetrics
EnableWindow
GetClientRect
SetDlgItemTextA
SendMessageA
PostMessageA
DrawIcon
AppendMenuA
IsIconic
GetSystemMenu
shell32
CommandLineToArgvW
oleaut32
SystemTimeToVariantTime
ws2_32
htons
inet_addr
sendto
gethostbyname
WSAStartup
recvfrom
socket
bind
setsockopt
ioctlsocket
closesocket
WSACleanup
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CHONG Size: 4KB - Virtual size: 155B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE