Static task
static1
Behavioral task
behavioral1
Sample
3e0421a292f20fdd9eb0f1d92ae7664b1b21f1a6deb4355bd2a26e78e29aa3b2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3e0421a292f20fdd9eb0f1d92ae7664b1b21f1a6deb4355bd2a26e78e29aa3b2.exe
Resource
win10v2004-20230703-en
General
-
Target
3e0421a292f20fdd9eb0f1d92ae7664b1b21f1a6deb4355bd2a26e78e29aa3b2
-
Size
1.1MB
-
MD5
03458d91a8d61d21e5fb53b8b43e6a45
-
SHA1
790e70a4bc20baa6711099bc32f586d75a129c9d
-
SHA256
3e0421a292f20fdd9eb0f1d92ae7664b1b21f1a6deb4355bd2a26e78e29aa3b2
-
SHA512
1139c41c33ba58d39938a05cd7ca5e8004a595034cf89b60bceb6d5c4ed1c9559316c085f6c3263ac0da357251e687e36a4eac10187cd924188cdde7c45ecb3c
-
SSDEEP
24576:mGtlqwAONbgwkj27a9Sbk8BxlGcpbpTHOwQcZ4S:mGtlqUNbM4bkQGcp9jOwjZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e0421a292f20fdd9eb0f1d92ae7664b1b21f1a6deb4355bd2a26e78e29aa3b2
Files
-
3e0421a292f20fdd9eb0f1d92ae7664b1b21f1a6deb4355bd2a26e78e29aa3b2.exe windows x64
aaf864eb11f862882030efb2e7b867dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
GetObjectA
GetClipRgn
Polyline
CreateRectRgn
CreatePen
SetBkColor
CreateSolidBrush
GetObjectType
SelectObject
GetDeviceCaps
DeleteDC
SetTextColor
SetBkMode
SelectClipRgn
LPtoDP
DeleteObject
CreateFontIndirectW
DPtoLP
kernel32
GetCurrentThreadId
SuspendThread
ResumeThread
SetFileAttributesW
Sleep
GetFileInformationByHandle
FormatMessageW
LocalFileTimeToFileTime
GetLastError
FileTimeToSystemTime
GetCurrentThread
TerminateThread
TlsAlloc
CloseHandle
GetLocalTime
GetOverlappedResult
DeleteCriticalSection
SystemTimeToFileTime
TlsGetValue
SystemTimeToTzSpecificLocalTime
TlsFree
CreateEventA
GetTickCount
GetDriveTypeW
SetFilePointer
SetEndOfFile
FlushFileBuffers
GetFileSizeEx
GetFileSize
BackupRead
BackupSeek
GetFileTime
BackupWrite
CreateHardLinkW
SetFileValidData
FindFirstFileW
CreateMutexA
ReleaseMutex
GetSystemTimeAsFileTime
SetPriorityClass
GetCommandLineW
SetSystemPowerState
GetCurrentProcess
GetThreadLocale
CreatePipe
DuplicateHandle
OpenProcess
ProcessIdToSessionId
TzSpecificLocalTimeToSystemTime
GetCurrentProcessId
SetThreadExecutionState
GetSystemTime
GetLongPathNameW
GetFileAttributesExW
GetStdHandle
SetConsoleMode
GetConsoleMode
WriteConsoleW
GetTempPathW
CreateProcessW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
FreeLibrary
UnmapViewOfFile
OpenMutexA
CreateFileMappingA
MapViewOfFile
DeviceIoControl
RemoveDirectoryW
FindFirstChangeNotificationW
GetVolumeNameForVolumeMountPointW
FindCloseChangeNotification
FindNextChangeNotification
WaitForSingleObject
FindClose
InitializeCriticalSection
LeaveCriticalSection
SetThreadPriority
SetFileTime
GetDiskFreeSpaceW
WriteFile
FindNextFileW
EnterCriticalSection
SetLastError
TlsSetValue
CancelIo
GetVolumeInformationW
ReadFile
MoveFileW
CopyFileW
MoveFileExW
DeleteFileW
CreateFileW
GetUserDefaultLCID
GetFileAttributesW
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleFileNameW
SetEvent
GetVersionExA
GetModuleHandleW
GetEnvironmentStringsW
WriteConsoleA
OutputDebugStringA
AttachConsole
OutputDebugStringW
FreeConsole
GetFileType
AllocConsole
SetThreadLocale
FindFirstFileExW
GetSystemDirectoryW
GlobalAlloc
GlobalFree
LoadLibraryW
GlobalLock
MultiByteToWideChar
WideCharToMultiByte
CreateMutexW
RtlCaptureStackBackTrace
GetExitCodeThread
K32GetModuleBaseNameA
RaiseException
K32GetModuleInformation
CreateThread
K32EnumProcessModules
IsBadReadPtr
SetUnhandledExceptionFilter
ExitProcess
SizeofResource
FindResourceA
LockResource
LoadResource
GetSystemInfo
VirtualQuery
LoadLibraryExA
LCMapStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
HeapAlloc
HeapReAlloc
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
SetFilePointerEx
GetConsoleOutputCP
HeapSize
GetEnvironmentVariableW
GetFullPathNameW
CreateDirectoryW
wintrust
WinVerifyTrust
Sections
.text Size: 1008KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE