Static task
static1
Behavioral task
behavioral1
Sample
c3ff6154d2fd82ec2af55472530b4053.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c3ff6154d2fd82ec2af55472530b4053.exe
Resource
win10v2004-20240226-en
General
-
Target
c3ff6154d2fd82ec2af55472530b4053
-
Size
18KB
-
MD5
c3ff6154d2fd82ec2af55472530b4053
-
SHA1
6d88aa2d4141677cedf5f70bd896c1a45deccee5
-
SHA256
9e64ca4064f6ee3266fe0af152f1358ec13694755519b0035075573d1f3795dd
-
SHA512
8b86baaaa8b9b1e059fe8a86374595bf90a39d34fcb08ee1a5f1b39182ded47b2025eb1cf6fb3dde891d9b0f25ee50a3250fc8a5a5435c2949494a43f44a05b8
-
SSDEEP
384:pYy8tV7mT9CD9xj1U2aZOwtedhy8B1c38QL0ywe4R/Vv1gc:x8t6Cxt1UXte+8/c38e0xe4R/Vv1R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3ff6154d2fd82ec2af55472530b4053
Files
-
c3ff6154d2fd82ec2af55472530b4053.exe windows:4 windows x86 arch:x86
ee69aad5a2d07189d713238d2d29c15a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord939
ord6877
ord6648
ord798
ord1997
ord6407
ord532
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord6385
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord6883
ord5608
ord5856
ord5194
ord533
ord5465
ord353
ord3318
ord1576
ord941
ord1200
ord924
ord1168
ord1979
ord665
ord2764
ord541
ord6143
ord801
ord5861
ord535
ord389
ord5207
ord1988
ord690
ord860
ord537
ord4204
ord4202
ord5683
ord4277
ord858
ord823
ord540
ord800
ord825
ord1105
ord2982
ord4673
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
fopen
fclose
_setmbcp
__CxxFrameHandler
_mbsicmp
strcmp
_mbscmp
kernel32
GetModuleHandleA
GetSystemDirectoryA
CloseHandle
lstrlenA
GetProcAddress
LoadLibraryA
DeleteFileA
SleepEx
GetStartupInfoA
TerminateProcess
GetExitCodeProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
CopyFileA
GetModuleFileNameA
user32
FindWindowExA
GetClassNameA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowTextA
EnableWindow
PostMessageA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ