Static task
static1
Behavioral task
behavioral1
Sample
3b1e0129822e85c13f706e708f866f337458a59092431d35e29fa9da48f7ae62N.exe
Resource
win7-20240903-en
General
-
Target
3b1e0129822e85c13f706e708f866f337458a59092431d35e29fa9da48f7ae62N.exe
-
Size
296KB
-
MD5
f304c9e1409515ce83feddd75b11d5c0
-
SHA1
c395a06392c1cfcbcb3bd390f2d5f919ec18af00
-
SHA256
3b1e0129822e85c13f706e708f866f337458a59092431d35e29fa9da48f7ae62
-
SHA512
bccebf7b19231e50415556d10ccf4fb9875a93fdaa3973da44fd77b653d5572b6ec611b969c0d5e7b429db32676dde6d3e4b219a16741aea6b4140be04b45ede
-
SSDEEP
6144:7MDcW16ZwIJssQ8Uy4UcYZVTc2rPzjJOHAOgxqqDLu2l:7MDV1EEd+4UcUVTjPEHRqnu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b1e0129822e85c13f706e708f866f337458a59092431d35e29fa9da48f7ae62N.exe
Files
-
3b1e0129822e85c13f706e708f866f337458a59092431d35e29fa9da48f7ae62N.exe.exe windows:4 windows x86 arch:x86
e3571dd5a9e9b81772c8cabcd924caff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperA
CharLowerA
kernel32
CreateThread
QueryPerformanceCounter
QueryPerformanceFrequency
CloseHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetProcAddress
LoadLibraryA
FreeLibrary
SetConsoleMode
GetStdHandle
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleWindowInfo
SetConsoleScreenBufferSize
AllocConsole
GetEnvironmentVariableA
SetLocalTime
GetLocalTime
OutputDebugStringA
GetConsoleMode
ReadConsoleInputA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
SetEndOfFile
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
GetLastError
DeleteFileA
ExitThread
GetCurrentThreadId
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
RaiseException
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ReadFile
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
WriteFile
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesA
CreateFileA
WideCharToMultiByte
GetTimeZoneInformation
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InterlockedExchange
wsock32
getsockname
gethostname
sendto
WSAGetLastError
recvfrom
gethostbyname
socket
setsockopt
inet_ntoa
bind
htons
WSACleanup
WSAStartup
closesocket
ioctlsocket
inet_addr
htonl
ntohs
winmm
timeGetTime
timeBeginPeriod
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�"�&�u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE