Static task
static1
Behavioral task
behavioral1
Sample
d3b7f5ec24474bd3c11be6286f33a6e9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3b7f5ec24474bd3c11be6286f33a6e9.exe
Resource
win10v2004-20231215-en
General
-
Target
d3b7f5ec24474bd3c11be6286f33a6e9
-
Size
49KB
-
MD5
d3b7f5ec24474bd3c11be6286f33a6e9
-
SHA1
2c09a7280538b79b5dab69311168dab70b737506
-
SHA256
cdd0f0c75dd33934f1466bff63609910efaf1c4e841fcd5cb69d6383d789334d
-
SHA512
62d072810ff3126371b8d5ac3399973aa1d44897d59a80eb962aa074fbf63b4d620f08d9a578809d261610b5c84aad4d25f967b693e7da2df239228aaeb85838
-
SSDEEP
1536:W3BZFLf8wVACb2y2dJ3J5DOlBb0TDPrNs3E:wpbl2L5FAcDPB/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3b7f5ec24474bd3c11be6286f33a6e9
Files
-
d3b7f5ec24474bd3c11be6286f33a6e9.exe windows:4 windows x86 arch:x86
9a465e790055fe5bff6918f4497b4a39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateThread
lstrcmpiA
WaitForSingleObject
CreateProcessA
CloseHandle
WriteFile
GetTickCount
CreateFileA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
ExpandEnvironmentStringsA
LoadLibraryA
ReleaseMutex
CreateMutexA
GetLocaleInfoA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
SetFileAttributesA
CopyFileA
TerminateThread
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
GetFileAttributesA
GetWindowsDirectoryA
GetSystemDefaultLangID
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetModuleHandleA
LocalFree
WideCharToMultiByte
MultiByteToWideChar
GetStartupInfoA
Sleep
GetVersionExA
ExitThread
user32
ShowWindow
FindWindowExA
SendMessageA
IsWindow
FindWindowA
GetMenu
CharLowerA
GetWindowThreadProcessId
CloseClipboard
EmptyClipboard
OpenClipboard
VkKeyScanA
keybd_event
SetFocus
SetForegroundWindow
BlockInput
SetClipboardData
msvcrt
wcslen
_CxxThrowException
_strdup
_stricmp
_controlfp
strncpy
strstr
free
realloc
sprintf
malloc
__CxxFrameHandler
??2@YAPAXI@Z
_snprintf
memset
strcpy
strchr
rand
strcat
memcpy
strlen
memcmp
srand
_vsnprintf
strcmp
_strlwr
toupper
_EH_prolog
strtok
atoi
fread
fopen
strncat
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
advapi32
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
ws2_32
closesocket
ioctlsocket
socket
connect
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE