Static task
static1
Behavioral task
behavioral1
Sample
d3ad9e97863783ae671dfb94eeb8c7bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3ad9e97863783ae671dfb94eeb8c7bd.exe
Resource
win10v2004-20240226-en
General
-
Target
d3ad9e97863783ae671dfb94eeb8c7bd
-
Size
47KB
-
MD5
d3ad9e97863783ae671dfb94eeb8c7bd
-
SHA1
d6e8ac7f51c1fe335f346d75c530c1f87e44d17d
-
SHA256
a30dc5cdaa77d30a8c5f7c922bab040e9f4fec310993dec6c18b7c8c4558088d
-
SHA512
ec6f1dfd640f77e10b79c2bfcc4ecad4401a3a308b6eaf42d1dad293ca76435f1cfbbc4cfe9e4576608c2b38cd23957b10db0dc73d50d86c46dd95a862654f4e
-
SSDEEP
768:9TuXIEyrhGh4cTvvQhRjbacva8V8SrfGGfcGfNGflCtXIStXI1OwtXntXIEctXIw:9DEGohJLQ/PachbuGkGVGdv0EdEgm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3ad9e97863783ae671dfb94eeb8c7bd
Files
-
d3ad9e97863783ae671dfb94eeb8c7bd.exe windows:4 windows x86 arch:x86
1e36d3b8ba9ab0423be77597ea15d665
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
SetErrorMode
GetCommandLineA
CreateMutexA
GetLastError
HeapFree
CreateThread
HeapAlloc
ExitProcess
WriteFile
CloseHandle
CreateFileA
lstrlenA
SetFileTime
SetFilePointer
CopyFileA
GetFileTime
lstrcatA
Sleep
FreeLibrary
DeleteFileA
MoveFileExA
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
ReadFile
GetTickCount
lstrcpyA
GetComputerNameA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
shell32
ShellExecuteA
ws2_32
setsockopt
htons
send
inet_ntoa
ntohl
closesocket
recv
connect
htonl
bind
socket
WSAStartup
user32
wsprintfA
advapi32
ControlService
ChangeServiceConfigA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
shlwapi
SHSetValueA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE