Static task
static1
Behavioral task
behavioral1
Sample
3c16a6a326ea0eaa96ce0b0be16877fb6b3fe267f5b0a322d8611375f151207e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c16a6a326ea0eaa96ce0b0be16877fb6b3fe267f5b0a322d8611375f151207e.exe
Resource
win10v2004-20240709-en
General
-
Target
3c16a6a326ea0eaa96ce0b0be16877fb6b3fe267f5b0a322d8611375f151207e
-
Size
51KB
-
MD5
637f4603d7ff1fac3c71f5c67262d4cb
-
SHA1
f2afd9a68605abe4fc83db9deeb30c1e2bdf24a5
-
SHA256
3c16a6a326ea0eaa96ce0b0be16877fb6b3fe267f5b0a322d8611375f151207e
-
SHA512
757779b50e42ab30ca980b9ada8e87af7a50de45f5e79710914ff6902e553739c7d05e54aafb003a87549fe35437f25079585e21be69c2fc79f7816005c8a580
-
SSDEEP
768:hAvJ4LSyC8aVN7bX3V0S0AVrEXAgTlxorsf8ISyb:2B4OyC8aVN7jljBmpOrs83yb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c16a6a326ea0eaa96ce0b0be16877fb6b3fe267f5b0a322d8611375f151207e
Files
-
3c16a6a326ea0eaa96ce0b0be16877fb6b3fe267f5b0a322d8611375f151207e.exe windows:4 windows x86 arch:x86
cf19f3378b2e9b39476b07800e274748
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
SetFocus
DialogBoxParamA
SendMessageA
GetDlgItem
TranslateMessage
DispatchMessageA
GetMessageA
IsChild
GetActiveWindow
SetCapture
GetWindowTextW
TrackPopupMenu
FlashWindowEx
TranslateAcceleratorA
GetKeyState
MessageBoxA
GetDlgItemTextA
kernel32
HeapAlloc
GetProcessHeap
GetModuleHandleA
CloseHandle
GetTickCount
GetVersionExA
ExitProcess
comctl32
ord17
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 230B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ