Static task
static1
Behavioral task
behavioral1
Sample
3b55d16d4573718b2bd722914b09e4096c7ca4ea6ca8c735a003988cb633bc1a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b55d16d4573718b2bd722914b09e4096c7ca4ea6ca8c735a003988cb633bc1a.exe
Resource
win10v2004-20240709-en
General
-
Target
3b55d16d4573718b2bd722914b09e4096c7ca4ea6ca8c735a003988cb633bc1a.exe
-
Size
164KB
-
MD5
c20fa0ab6b79f5d972c8ce22fa9c52b1
-
SHA1
a4684e4d865d543a2a498f034af4c9d2c1b6261a
-
SHA256
3b55d16d4573718b2bd722914b09e4096c7ca4ea6ca8c735a003988cb633bc1a
-
SHA512
3ace193785b00978e06d8dc5a7db3872a7e719c2c8b2b2da07ffcdbe3f9a1188962f974b9d2fb1ed4c0e0f93cf33b575ca5d2b27019dab301bb1e21a181e5a94
-
SSDEEP
3072:++/LImiO24Vvt0JiGcFaw/5uCvZMt/2PE9w:3/LIP63GcRasP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3b55d16d4573718b2bd722914b09e4096c7ca4ea6ca8c735a003988cb633bc1a.exe
Files
-
3b55d16d4573718b2bd722914b09e4096c7ca4ea6ca8c735a003988cb633bc1a.exe.exe windows:5 windows x86 arch:x86
61aeaa8ec5698536c7a8f0b1ac00ff47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
CreateJobObjectW
SleepEx
GetCommProperties
GetModuleHandleW
GetConsoleAliasesA
GlobalAlloc
SetVolumeMountPointA
lstrcpynW
GetModuleFileNameW
SetConsoleTitleA
WritePrivateProfileStringW
ReleaseActCtx
SetLastError
GetProcAddress
BuildCommDCBW
GetAtomNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
InterlockedExchangeAdd
SetFileApisToANSI
AddAtomA
OpenJobObjectW
FoldStringW
EnumDateFormatsA
lstrcatW
FindFirstVolumeW
LocalFree
FlushFileBuffers
CloseHandle
GetLastError
HeapFree
MultiByteToWideChar
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
user32
GetProcessDefaultLayout
winhttp
WinHttpAddRequestHeaders
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 600KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vaxita Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.weru Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fakihot Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ