Static task
static1
Behavioral task
behavioral1
Sample
a3188959021cd34ef52935bdadc3e79dc984bfa44bfba5db4465a337511368e7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a3188959021cd34ef52935bdadc3e79dc984bfa44bfba5db4465a337511368e7.exe
Resource
win10v2004-20230703-en
General
-
Target
a3188959021cd34ef52935bdadc3e79dc984bfa44bfba5db4465a337511368e7
-
Size
3.4MB
-
MD5
9f29c0406a51e7d2e1a424b520216c20
-
SHA1
8f6d4a394e0477a25029313086110011e6c571e5
-
SHA256
a3188959021cd34ef52935bdadc3e79dc984bfa44bfba5db4465a337511368e7
-
SHA512
f78ddfa4544a1a73b118fbb82facbdaf8e4a98e38d902416e795ddf9d932bde7e88139018467f0decdf2f25dff120b8492fb8dfba9d42d609935bd1c2a1ec43f
-
SSDEEP
49152:Amc4BDjm+6R3ys1lo+HPIUPLbD+D/vUK9N1hHk9W9/dLCLV6cJI:AmzQFbXz293h/dLCLV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3188959021cd34ef52935bdadc3e79dc984bfa44bfba5db4465a337511368e7
Files
-
a3188959021cd34ef52935bdadc3e79dc984bfa44bfba5db4465a337511368e7.exe windows x86
7d213893af3f0c451b6aeaa4e708bdd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
ResetEvent
SetEvent
SetFileAttributesW
IsBadReadPtr
lstrcmpiW
SetProcessDEPPolicy
LoadLibraryExW
VirtualProtect
GetSystemDirectoryW
GetStartupInfoW
CreateProcessW
GetCurrentThreadId
GetCurrentProcessId
CreateMutexW
WaitForSingleObject
InitializeCriticalSectionEx
SetUnhandledExceptionFilter
RaiseException
DecodePointer
DeleteFileW
CompareStringW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrcmpW
GetLocalTime
GetFileSizeEx
GetFileAttributesW
GetFileSize
lstrlenA
ExpandEnvironmentStringsW
FindNextFileW
FindClose
GetCurrentThread
GetOverlappedResult
CreateNamedPipeW
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
WriteFile
ReadFile
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
ReadConsoleW
CreateProcessA
GetCommandLineW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetStdHandle
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
VirtualQuery
GetModuleHandleExW
ExitThread
RtlUnwind
OpenFileMappingW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
ReleaseMutex
MulDiv
WaitForMultipleObjects
WinExec
LoadLibraryA
WriteProcessMemory
VirtualFreeEx
VirtualAllocEx
GetTickCount
OpenProcess
CreateRemoteThread
SetLastError
MoveFileExW
Sleep
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
CloseHandle
SetFilePointer
WideCharToMultiByte
lstrlenW
lstrcpynW
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCurrentProcess
GetLastError
MultiByteToWideChar
FindResourceW
SizeofResource
LockResource
LoadResource
FreeLibrary
FindResourceExW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
AreFileApisANSI
HeapCreate
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
GetFullPathNameA
UnlockFileEx
HeapValidate
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
FlushViewOfFile
GetVersionExA
DeleteFileA
GetSystemInfo
HeapCompact
UnlockFile
CreateFileMappingA
LockFileEx
FormatMessageA
FlushFileBuffers
GetVersionExW
GetSystemWindowsDirectoryW
InterlockedCompareExchange
CreateFileA
lstrcmpiA
lstrcmpA
DeviceIoControl
TerminateProcess
InitializeCriticalSection
GetProcessHeap
UnhandledExceptionFilter
GetTempFileNameW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
GetVersion
ResumeThread
SystemTimeToFileTime
GetSystemTime
SetEndOfFile
FreeResource
ExitProcess
GetACP
LocalFree
GetTempPathW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
CreateFileW
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetExitCodeProcess
HeapDestroy
FlushInstructionCache
InterlockedPushEntrySList
GetStringTypeW
FormatMessageW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
TryEnterCriticalSection
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
QueryPerformanceCounter
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
user32
FindWindowW
GetCursorPos
CopyRect
PtInRect
IsWindow
DestroyWindow
DefWindowProcW
SendMessageTimeoutW
SetWindowPos
PostMessageW
CharNextW
GetMonitorInfoW
SendMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CallWindowProcW
GetClassNameW
EnumWindows
GetWindowTextW
SetWindowTextW
RemovePropW
GetPropW
SetPropW
LoadStringW
UpdateWindow
MapVirtualKeyW
GetKeyNameTextW
DestroyIcon
LoadIconW
GetActiveWindow
GetParent
OffsetRect
FrameRect
FillRect
GetCaretPos
SetCaretPos
GetClientRect
InvalidateRect
EndPaint
BeginPaint
GetWindowDC
DrawTextW
GetFocus
MonitorFromWindow
SetRectEmpty
LockWorkStation
LoadCursorW
GetWindowThreadProcessId
FindWindowExW
wvsprintfW
InflateRect
UnionRect
GetDC
ReleaseDC
MonitorFromPoint
IsChild
UpdateLayeredWindow
IsZoomed
GetKeyState
SetCapture
ReleaseCapture
GetUpdateRect
CreateCaret
GetCaretBlinkTime
MapWindowPoints
IntersectRect
IsRectEmpty
GetWindow
RegisterClassW
EnableWindow
ShowWindow
LoadImageW
IsIconic
SetWindowRgn
MessageBoxW
DrawIconEx
CharPrevW
SetRect
GetIconInfo
HideCaret
ShowCaret
GetSysColor
SetLayeredWindowAttributes
RedrawWindow
GetWindowTextLengthW
CreateAcceleratorTableW
InvalidateRgn
IsWindowEnabled
EqualRect
ScreenToClient
ClientToScreen
SetCursor
GetWindowRect
SetForegroundWindow
SetActiveWindow
KillTimer
SetTimer
SetFocus
IsWindowVisible
MoveWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
PostQuitMessage
UnregisterHotKey
RegisterHotKey
TrackMouseEvent
RegisterWindowMessageW
SystemParametersInfoW
wsprintfW
SetWindowLongW
GetWindowLongW
EnumDisplayMonitors
gdi32
GetStockObject
GetObjectW
CreateDIBSection
CreateCompatibleDC
GetTextExtentPoint32W
CreateDCW
ExtTextOutW
SetTextColor
SetBkMode
SetBkColor
SelectObject
DeleteObject
DeleteDC
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
SelectClipRgn
ExtSelectClipRgn
StretchBlt
SetStretchBltMode
SetDIBColorTable
TextOutW
GetDIBits
SetDIBitsToDevice
comdlg32
ChooseColorW
advapi32
RegCloseKey
RegNotifyChangeKeyValue
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegGetValueW
RegCreateKeyW
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ord75
ShellExecuteW
SHFileOperationW
ord155
SHGetFolderLocation
SHBindToParent
ord165
SHGetFileInfoW
Shell_NotifyIconW
SHGetFolderPathW
ole32
CoCreateGuid
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoUninitialize
OleInitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
SysStringLen
VariantClear
VariantTimeToSystemTime
SysFreeString
SysAllocStringLen
SystemTimeToVariantTime
SafeArrayPutElement
VarBstrCmp
SafeArrayCreate
SysAllocString
VariantInit
shlwapi
PathFindFileNameW
PathFindExtensionW
PathAddBackslashW
StrRetToBufW
StrTrimA
StrCmpIW
SHGetValueW
PathIsDirectoryW
PathCombineW
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
wnsprintfW
StrCmpNIW
StrStrIA
SHSetValueA
SHGetValueA
SHAutoComplete
StrCpyW
StrStrIW
comctl32
ord17
_TrackMouseEvent
InitCommonControlsEx
ImageList_DrawEx
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
gdiplus
GdipGraphicsClear
GdipCloneBitmapAreaI
GdipCreateBitmapFromStream
GdipCreateTexture
GdipClosePathFigure
GdipDrawImageRectRectI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipGetImagePixelFormat
GdipGetPropertyItem
GdiplusStartup
GdipAlloc
GdipFree
GdipFillPath
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusShutdown
GdipCreateBitmapFromHBITMAP
GdipCreateHBITMAPFromBitmap
GdipGetImageGraphicsContext
GdipDrawImagePointsI
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipCloneImage
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawRectangleI
GdipDrawPath
GdipFillEllipseI
GdipAddPathArc
GdipDrawEllipseI
GdipLoadImageFromFile
GdipImageGetFrameCount
imm32
ImmAssociateContext
sensapi
IsNetworkAlive
wininet
DeleteUrlCacheEntryW
InternetGetConnectedState
InternetCrackUrlW
iphlpapi
GetAdaptersInfo
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
msimg32
GradientFill
AlphaBlend
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 377KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 781KB - Virtual size: 781KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ