Static task
static1
Behavioral task
behavioral1
Sample
3c6965033df42f19b2a9ef7581ac8bc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c6965033df42f19b2a9ef7581ac8bc0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3c6965033df42f19b2a9ef7581ac8bc0N.exe
-
Size
434KB
-
MD5
3c6965033df42f19b2a9ef7581ac8bc0
-
SHA1
2b8c38100e013b849aa37019ffffd504c83e5ace
-
SHA256
e7b64dada0aea692cfb6c074af9eef39966d5508367329e265816fc10dee9394
-
SHA512
c53fedc13a84bf7afc9b1819ec236fbc206e9d185c6ccd362bede46bea747561120a12882ef58b0ee2ffbfa9085fae1c8b3054aff2a2adcce1e8961d08ac2f37
-
SSDEEP
12288:RaLBwRFjyJCPdBWUiS7iejrM4F16mYOp6u:sLBwRQJCPdBDiS7HjrM4F16o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c6965033df42f19b2a9ef7581ac8bc0N.exe
Files
-
3c6965033df42f19b2a9ef7581ac8bc0N.exe.exe windows:4 windows x86 arch:x86
4e114cb9809ba156f768b364ad683132
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
_access
_putenv
_stat
_strdup
_tzset
__getmainargs
__lc_codepage
__mb_cur_max
__p___argc
__p___argv
__p__environ
__p__fmode
__set_app_type
_assert
_beginthread
_cexit
_errno
_filbuf
_iob
_isctype
_onexit
_pctype
_setmode
_stricmp
_strnicmp
abort
atexit
atoi
difftime
exit
fclose
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
gmtime
localeconv
localtime
malloc
memcpy
memmove
memset
mktime
printf
puts
rand
realloc
setbuf
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strerror
strftime
strlen
strncat
strncmp
strncpy
strpbrk
strstr
strtol
time
tolower
toupper
ungetc
vfprintf
wcslen
mgwz
inflate
inflateEnd
inflateInit2_
gdi32
DeleteObject
GetStockObject
kernel32
CloseHandle
CreateEventA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FormatMessageA
FreeLibrary
GetCommandLineA
GetCurrentThreadId
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
SetCurrentDirectoryA
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
shell32
ShellExecuteA
Shell_NotifyIconA
user32
CallWindowProcA
CheckMenuItem
ClientToScreen
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
EnableMenuItem
GetClientRect
GetCursorPos
GetKeyState
GetMessageA
GetSubMenu
GetWindowLongA
GetWindowTextLengthA
KillTimer
LoadIconA
LoadMenuA
MessageBoxA
PostMessageA
PostQuitMessage
RegisterClassA
RegisterClassExA
RegisterWindowMessageA
SendMessageA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
TrackPopupMenu
TranslateMessage
UpdateWindow
ws2_32
WSAGetLastError
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
freeaddrinfo
getaddrinfo
gethostbyname
getnameinfo
getsockname
getsockopt
htonl
inet_addr
listen
recv
select
send
setsockopt
socket
Sections
.text Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 13KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE