Static task
static1
Behavioral task
behavioral1
Sample
3fd3ae6bc81e778644efe8ce4820bff6b7e1d1346a29554a01b24911cfaa2b11.exe
Resource
win10v2004-20240508-en
General
-
Target
3fd3ae6bc81e778644efe8ce4820bff6b7e1d1346a29554a01b24911cfaa2b11
-
Size
482KB
-
MD5
8fac2d1f23a184a88b127f253f6cd1c1
-
SHA1
6304d0f485a63b1860a9cde231b574db0fb4b0e6
-
SHA256
3fd3ae6bc81e778644efe8ce4820bff6b7e1d1346a29554a01b24911cfaa2b11
-
SHA512
064bf7dbf2e75c41707a82116e0d5fc9ed08df36b7ba872c0ca7d4f8944afab3b18004123ba73dacfff64891ea4c9fadfdccd9d8fe60a0209e0a4eb9bee09f82
-
SSDEEP
6144:KL8vtu8N16S9dVCQJH9EgFwTxbLwCF9yriKKuQzDstDwEipvzGsXk:KQ1u8fdLeJNvyGKKu9tkfpvSK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fd3ae6bc81e778644efe8ce4820bff6b7e1d1346a29554a01b24911cfaa2b11
Files
-
3fd3ae6bc81e778644efe8ce4820bff6b7e1d1346a29554a01b24911cfaa2b11.exe windows:5 windows x86 arch:x86
b884bb5d5a6f26c6be21c320191b7934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetComputerNameW
GetTimeFormatA
FreeEnvironmentStringsA
GetModuleHandleW
FormatMessageW
GetStringTypeExW
GetFileAttributesA
GetConsoleAliasW
GetConsoleAliasesW
SetLastError
GetProcAddress
FindVolumeMountPointClose
WriteConsoleOutputW
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
ConvertDefaultLocale
GetModuleFileNameA
EnumDateFormatsA
SetConsoleTitleW
GetProcessAffinityMask
CompareStringA
DeleteCriticalSection
GetShortPathNameW
OpenFileMappingA
LocalFileTimeToFileTime
BuildCommDCBW
GlobalDeleteAtom
MultiByteToWideChar
HeapAlloc
GetLastError
HeapReAlloc
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
advapi32
DuplicateToken
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 286KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 610KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.galuwah Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ