Static task
static1
Behavioral task
behavioral1
Sample
3d179289c0d8800cc4b6f918b79eeeece32b386a0def1ad49df6169f48a27783.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3d179289c0d8800cc4b6f918b79eeeece32b386a0def1ad49df6169f48a27783.exe
Resource
win10v2004-20230220-en
General
-
Target
3d179289c0d8800cc4b6f918b79eeeece32b386a0def1ad49df6169f48a27783
-
Size
384KB
-
MD5
c927ac01c22ce1ade2980ffa4ef087b9
-
SHA1
93d33463c095e5a1849ad4fa97aa106a70426b84
-
SHA256
3d179289c0d8800cc4b6f918b79eeeece32b386a0def1ad49df6169f48a27783
-
SHA512
f4d96ca7f1b73d9e8aa054f84830a76484844b1665a929625507fc6d8d99da19b367aa24920277e4d0e8ae358b322b9f3f16857e1bc73d55884ce26c7fc5d0f1
-
SSDEEP
6144:/WTzminRnLKdZkje4OqCg0mWgsKNCgXyWviGKWgJuUNeJPkbdR+wg2wMiV1mQxxj:Qz1nLKdZkje4xteK0WKWgJuUy37MiV1d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d179289c0d8800cc4b6f918b79eeeece32b386a0def1ad49df6169f48a27783
Files
-
3d179289c0d8800cc4b6f918b79eeeece32b386a0def1ad49df6169f48a27783.exe windows x86
1b606aa3bcf7a46ad861f7db3b76d2dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
sendto
setsockopt
WSAGetLastError
socket
recv
select
connect
ntohs
inet_addr
bind
recvfrom
closesocket
WSAStartup
send
ntohl
htons
htonl
WSACleanup
netapi32
Netbios
kernel32
CreateFileA
GetShortPathNameA
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
GetVolumeInformationA
TerminateProcess
ExitThread
HeapSize
HeapDestroy
HeapCreate
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
VirtualProtect
GetSystemInfo
VirtualQuery
SetStdHandle
SetEnvironmentVariableA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
SystemTimeToFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedDecrement
SetLastError
MulDiv
FormatMessageA
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcmpW
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
FreeResource
WaitForSingleObject
GlobalAlloc
ResetEvent
GlobalFree
GetModuleFileNameA
lstrcmpA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
VirtualAlloc
CreateEventA
WaitForMultipleObjects
VirtualFree
GetLocalTime
GetComputerNameA
lstrcpynA
GetTickCount
MapViewOfFile
SetEvent
Sleep
UnmapViewOfFile
OpenEventA
GetLastError
OpenFileMappingA
CloseHandle
lstrcatA
lstrcpyA
CreateThread
GetStringTypeExA
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapReAlloc
user32
WindowFromPoint
FindWindowA
DrawIcon
SetWindowRgn
GetDCEx
LockWindowUpdate
DestroyIcon
CopyAcceleratorTableA
CreateMenu
PostThreadMessageA
GetTabbedTextExtentA
RegisterClipboardFormatA
GetSystemMenu
DeleteMenu
IsRectEmpty
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
GetCursorPos
LoadCursorA
DestroyCursor
SetCursorPos
SetCapture
RedrawWindow
ClientToScreen
InflateRect
IsZoomed
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
SetCursor
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetMenuStringA
AppendMenuA
InsertMenuA
RemoveMenu
ReleaseDC
GetDC
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
MessageBoxA
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
GetMenuItemInfoA
GetSysColorBrush
SetRect
GetMessageA
EndDialog
wsprintfA
LoadStringA
GetWindowLongA
SetWindowLongA
GetParent
GetKeyState
UpdateWindow
GetSystemMetrics
GetClientRect
LoadBitmapA
LoadIconA
SendMessageA
EnableWindow
TranslateMessage
ValidateRect
ShowOwnedPopups
PostQuitMessage
CallNextHookEx
SetParent
KillTimer
SetTimer
CharUpperA
GetWindowTextLengthA
gdi32
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
CreatePatternBrush
GetStockObject
CreatePen
CreateRectRgn
CreateSolidBrush
GetViewportOrgEx
DPtoLP
Rectangle
StartPage
EndPage
SetAbortProc
TextOutA
EndDoc
CreateFontIndirectA
SetRectRgn
CombineRgn
GetBkColor
CreateEllipticRgn
LPtoDP
Ellipse
GetNearestColor
GetBkMode
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextColor
GetTextAlign
GetTextFaceA
GetWindowOrgEx
SelectClipRgn
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
RectVisible
PtVisible
StartDocA
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetTextExtentPoint32A
GetTextMetricsA
CreateFontA
GetCharWidthA
SelectObject
StretchDIBits
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
CreateDCA
PatBlt
CreateRectRgnIndirect
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
AbortDoc
DeleteObject
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
comdlg32
CommDlgExtendedError
PrintDlgA
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetJobA
advapi32
RegCreateKeyA
RegSetValueA
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
SetFileSecurityA
GetFileSecurityA
RegCloseKey
shell32
DragQueryFileA
ExtractIconA
SHGetFileInfoA
DragFinish
comctl32
ImageList_AddMasked
ImageList_ReplaceIcon
ord17
ImageList_Destroy
ImageList_Create
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fkdkdte Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE