Static task
static1
Behavioral task
behavioral1
Sample
3663be2201d078957aecf5903b6cc930N.exe
Behavioral task
behavioral2
Sample
3663be2201d078957aecf5903b6cc930N.exe
General
-
Target
3663be2201d078957aecf5903b6cc930N.exe
-
Size
96KB
-
MD5
3663be2201d078957aecf5903b6cc930
-
SHA1
30c0557a35c0c880f5c71b9b624c3465f9d6a1d8
-
SHA256
84380edcb1b4aa1710373e8d24bb2e56116ae795a5d79ed915303ac27721d218
-
SHA512
1fc2d7b728f897c3a60c0bb3c8271c93b6b2db2159d1f3ca302c08c07d6d07176832d49c89b3c899b10aefe6f8cda877a3e5643675b9070368c48d50f4376999
-
SSDEEP
192:vN4d/JaJXRkdYjdGX6rSc9YRiU535uFYGX6rhsJV8S6P3EB0efZfWaxPYpcBsp7/:1CMl5ScYbl5uFI6JV8s5W0YpcB+LAw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3663be2201d078957aecf5903b6cc930N.exe
Files
-
3663be2201d078957aecf5903b6cc930N.exe.exe windows:5 windows x86 arch:x86
c585d9b7637cb43fc6a3b820441b7ebb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetDC
ReleaseDC
CreateCursor
DestroyCursor
ShowCursor
AppendMenuA
DrawTextExA
CharUpperA
CreateAcceleratorTableA
DrawEdge
GetClientRect
RegisterWindowMessageA
MoveWindow
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
kernel32
lstrlen
SetLastError
GetCommandLineA
GetStartupInfoA
ExitProcess
HeapFree
GetModuleHandleA
lstrlenA
MapViewOfFile
HeapDestroy
MultiByteToWideChar
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
Sections
.MPRESS1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE