Static task
static1
Behavioral task
behavioral1
Sample
31902d3c0f02665291304281188aac3b1602f7fc7ae165519856ab95297a298f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
31902d3c0f02665291304281188aac3b1602f7fc7ae165519856ab95297a298f.exe
Resource
win10v2004-20230220-en
General
-
Target
31902d3c0f02665291304281188aac3b1602f7fc7ae165519856ab95297a298f
-
Size
1.7MB
-
MD5
9bb72832d350df2f6b352a04e3fb8c97
-
SHA1
ecb7707b212ee097bc680b5881889220eaf3d507
-
SHA256
31902d3c0f02665291304281188aac3b1602f7fc7ae165519856ab95297a298f
-
SHA512
562c79ef573bf58cb2a3ffea347d65345b5f9e8532b3fb327a1301ed08747fe47a1b9932cd10d037cff174ee194773881d5145147bae67e27c8931ab0e3c4e95
-
SSDEEP
24576:5NtB4IgZLxyrO2+FvTw/BBWf+qxSPtLr3YxTdxEDCp2s2V77rNMbDZ8W53gSlFNx:OwBFdZzwWDGUV77BGDeW5QWdDDGNtw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31902d3c0f02665291304281188aac3b1602f7fc7ae165519856ab95297a298f
Files
-
31902d3c0f02665291304281188aac3b1602f7fc7ae165519856ab95297a298f.exe windows x86
78108bc68cf21b12e20e4191b4a92714
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
libcurl
curl_easy_init
curl_easy_setopt
curl_easy_perform
curl_easy_cleanup
mfc71
ord4171
ord4178
ord4587
ord4776
ord4386
ord4401
ord4399
ord4381
ord4384
ord4379
ord4863
ord4860
ord3974
ord5914
ord1619
ord1402
ord5206
ord3344
ord1360
ord5166
ord1562
ord2717
ord4273
ord410
ord648
ord2164
ord4127
ord4125
ord6065
ord6283
ord1903
ord2419
ord2420
ord2421
ord2418
ord2417
ord3684
ord3430
ord1931
ord1483
ord1547
ord5915
ord4234
ord5214
ord4261
ord591
ord762
ord304
ord5731
ord2263
ord2367
ord709
ord602
ord5613
ord1929
ord1934
ord5888
ord347
ord501
ord5807
ord2469
ord3255
ord5331
ord6297
ord2346
ord1580
ord5320
ord6286
ord3161
ord3210
ord1280
ord1279
ord5637
ord2902
ord4098
ord2089
ord2991
ord3171
ord572
ord297
ord907
ord3454
ord1554
ord620
ord3195
ord6090
ord2131
ord3934
ord784
ord4353
ord2372
ord2468
ord4104
ord6167
ord3761
ord6236
ord3650
ord3477
ord741
ord6119
ord2095
ord1591
ord4240
ord3317
ord265
ord266
ord5716
ord5446
ord1185
ord1614
ord760
ord5563
ord3997
ord4394
ord4648
ord1728
ord1024
ord1084
ord3204
ord4749
ord1966
ord4001
ord4123
ord5641
ord5833
ord3287
ord5403
ord2475
ord4035
ord3989
ord2272
ord2654
ord4320
ord300
ord1486
ord2662
ord6144
ord2371
ord1283
ord1063
ord4790
ord1440
ord2751
ord3931
ord2288
ord2280
ord911
ord386
ord1916
ord5529
ord6179
ord3908
ord1396
ord807
ord795
ord4081
ord1489
ord299
ord2933
ord6118
ord4980
ord557
ord745
ord5642
ord6037
ord1395
ord2451
ord3244
ord416
ord651
ord1930
ord2075
ord326
ord2477
ord2938
ord1565
ord2869
ord1091
ord3163
ord4100
ord2094
ord1955
ord4888
ord3635
ord3595
ord1920
ord2931
ord5224
ord5227
ord3948
ord4569
ord5230
ord5213
ord5567
ord2838
ord4481
ord759
ord570
ord2249
ord4541
ord3683
ord4085
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord5226
ord2248
ord4568
ord5566
ord3333
ord757
ord566
ord629
ord1439
ord6288
ord5089
ord384
ord586
ord1054
ord1544
ord322
ord1123
ord3830
ord751
ord1025
ord4189
ord3182
ord562
ord5715
ord5491
ord785
ord4041
ord5323
ord5142
ord1917
ord5570
ord3401
ord1631
ord1096
ord313
ord1199
ord5185
ord1198
ord1263
ord908
ord5154
ord1191
ord1187
ord3760
ord630
ord3088
ord2021
ord385
ord3596
ord748
ord2098
ord1650
ord1594
ord4243
ord2983
ord3324
ord1968
ord1249
ord865
ord1545
ord4232
ord3164
ord587
ord4115
ord5640
ord2368
ord2086
ord4443
ord4444
ord3740
ord4914
ord4519
ord4520
ord4920
ord4559
ord5049
ord4439
ord4368
ord4501
ord4846
ord4970
ord4529
ord4480
ord4971
ord4516
ord4673
ord4948
ord4794
ord4287
ord4376
ord4377
ord4963
ord4796
ord4710
ord4364
ord4805
ord5053
ord4964
ord4649
ord4946
ord4507
ord4961
ord4674
ord4131
ord4389
ord4781
ord1482
ord4204
ord912
ord1302
ord2008
ord4132
ord781
ord4580
ord310
ord2322
ord876
ord2657
ord6067
ord578
ord1794
ord764
ord354
ord605
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3441
ord3641
ord631
ord1207
msvcr71
__p___argv
fread
strncmp
labs
abs
_itoa
_strnicmp
_strupr
_setmbcp
_mbctype
_resetstkoflw
_except_handler3
isspace
isalnum
_strdup
ftell
fseek
calloc
??1type_info@@UAE@XZ
strrchr
strstr
ceil
_splitpath
strftime
_localtime64
memmove
strchr
fopen
fwrite
fclose
_mbsnbicmp
_mbsrchr
strcpy
strcmp
strcat
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_time64
atoi
memcmp
time
srand
rand
sprintf
malloc
memcpy
free
strlen
memset
strncpy
_CxxThrowException
__security_error_handler
__dllonexit
_onexit
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
kernel32
WritePrivateProfileStringA
GetTickCount
GetPrivateProfileStringA
MulDiv
Sleep
ResumeThread
WinExec
GetPrivateProfileIntA
FreeLibrary
OutputDebugStringA
LoadLibraryA
GetProcAddress
CreateEventA
WaitForSingleObject
GetSystemDirectoryA
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
SetUnhandledExceptionFilter
GetModuleFileNameA
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
CreateThread
GlobalHandle
ReadFile
GetFileSize
lstrcmpiA
DeleteCriticalSection
RaiseException
lstrcpyA
GetFileAttributesA
lstrcatA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
ExitProcess
WaitForMultipleObjects
GetLastError
lstrlenA
MultiByteToWideChar
TerminateProcess
OpenProcess
InterlockedIncrement
WideCharToMultiByte
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WriteFile
SetFilePointer
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
DeleteFileA
InitializeCriticalSection
CreateMutexA
SetThreadPriority
GetCurrentThread
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateThread
CreateProcessA
FindFirstFileA
FindNextFileA
FindClose
user32
SendMessageA
LoadIconA
KillTimer
SetTimer
GetClientRect
DrawEdge
ReleaseCapture
SetWindowTextA
GetDlgItem
PeekMessageA
CallWindowProcA
SetCapture
GetWindowRect
SetLayeredWindowAttributes
GetWindowLongA
GetSystemMetrics
SetWindowLongA
SystemParametersInfoA
EnableWindow
InvalidateRect
DrawStateA
DrawFocusRect
GetWindowTextA
DefWindowProcA
RegisterClassA
CreateWindowExA
DestroyWindow
GetClassNameA
GetFocus
GetWindowDC
IsWindowEnabled
GetActiveWindow
RemoveMenu
InsertMenuA
EnableMenuItem
IsIconic
DrawIcon
RegisterWindowMessageA
PostThreadMessageA
wsprintfA
MessageBeep
FlashWindow
GetWindowThreadProcessId
AttachThreadInput
SetFocus
keybd_event
BringWindowToTop
SetActiveWindow
CallNextHookEx
PtInRect
ModifyMenuA
GetMenuItemID
GetMenuItemCount
FillRect
InflateRect
CopyRect
GetSysColor
DrawTextA
LoadCursorA
ScreenToClient
SetCursor
LoadMenuA
GetSubMenu
GetDesktopWindow
SetForegroundWindow
GetForegroundWindow
EnumWindows
UnhookWindowsHookEx
PostMessageA
IsWindowVisible
GetCursorPos
SetCursorPos
ClipCursor
ShowWindow
SetWindowsHookExA
SetWindowPos
GetDC
ReleaseDC
FindWindowA
LoadBitmapA
GetAsyncKeyState
PostQuitMessage
gdi32
SetMapMode
GetWindowExtEx
GetViewportExtEx
CreateDCA
GetDIBits
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
DeleteObject
GetStockObject
CreatePen
GetDeviceCaps
CreateFontA
CreateSolidBrush
StretchBlt
SetPixel
PatBlt
CreateBitmap
BitBlt
GetMapMode
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
advapi32
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
ImageList_Draw
_TrackMouseEvent
shlwapi
SHDeleteKeyA
PathRemoveFileSpecA
StrStrIA
StrRStrIA
PathFileExistsA
ole32
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
OleLoadPicture
SystemTimeToVariantTime
VarUdateFromDate
VariantTimeToSystemTime
VarBstrFromDate
SysFreeString
VariantChangeType
VariantClear
ws2_32
socket
WSAStartup
gethostbyname
inet_ntoa
WSACleanup
listen
connect
closesocket
bind
htonl
ntohl
ioctlsocket
getsockopt
WSAGetLastError
gethostname
send
select
accept
recv
htons
inet_addr
msvcp71
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??Bios_base@std@@QBEPAXXZ
??0?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@H@Z
??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
dbghelp
MiniDumpWriteDump
libeay32
ord3024
ord3171
ord3106
psapi
EnumProcessModules
GetProcessImageFileNameA
EnumProcesses
GetModuleBaseNameA
netapi32
Netbios
gdiplus
GdipAlloc
GdipGetImageWidth
GdipGetImageHeight
GdipLoadImageFromFileICM
GdipLoadImageFromStreamICM
GdiplusStartup
GdiplusShutdown
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipCloneImage
GdipSaveImageToStream
GdipCreateBitmapFromScan0
GdipCreateBitmapFromHBITMAP
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipLoadImageFromFile
GdipDrawImageRectRect
GdipDeleteGraphics
GdipCreateFromHDC
GdipFillRectangleI
GdipFree
GdipDisposeImage
GdipLoadImageFromStream
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 340KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ