Static task
static1
Behavioral task
behavioral1
Sample
3eb6ce70eef4f90463942fb49bdfff2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3eb6ce70eef4f90463942fb49bdfff2e.exe
Resource
win10v2004-20240412-en
General
-
Target
3eb6ce70eef4f90463942fb49bdfff2e.exe
-
Size
124KB
-
MD5
3eb6ce70eef4f90463942fb49bdfff2e
-
SHA1
f0ffc8fd84a6c1e676ef8762cc7310178b82b946
-
SHA256
c5c683eaf65736655e121b54b581b36029867fbf781d677c3a00b21b8a843e69
-
SHA512
54ed6db95890aa467303fd54410b179dce6f6150afc791f046ffe8bf23e51b2b49a37cc7c1c4af6fa2ccd59018aa91a06c191be1b8d2dc53979d20c71fe3172d
-
SSDEEP
1536:2+gi2i/OTW1bk3FwErVAHcT2BignpwLsO9NXw6dcp:26Z1bk1FVAHcTAO4O9fcp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eb6ce70eef4f90463942fb49bdfff2e.exe
Files
-
3eb6ce70eef4f90463942fb49bdfff2e.exe.exe windows:4 windows x86 arch:x86
79b96456f9efc94c33ade5e8ec421b2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CloseHandle
CreateFileA
GetModuleFileNameA
Sleep
CreateThread
SetLastError
GetLastError
TerminateProcess
OpenProcess
ReadFile
GetFileSize
WriteFile
SetFilePointer
SetFileAttributesA
GetLocalTime
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetThreadContext
CreateProcessA
GetCurrentDirectoryA
GetWindowsDirectoryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
DeleteFileA
CopyFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetProcessVersion
lstrcmpiA
WideCharToMultiByte
MultiByteToWideChar
user32
MessageBoxA
msvcrt
memcpy
??3@YAXPAX@Z
ftell
fclose
fread
fseek
strcpy
__CxxFrameHandler
_wcsnicmp
wcscpy
fwrite
time
memset
strcat
strlen
??2@YAPAXI@Z
_strnicmp
fopen
wcslen
_itoa
_wcsicmp
msvcp60
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE