Static task
static1
Behavioral task
behavioral1
Sample
3bb7914b51ba037648d9900db6a651dd5a2a58edec2aaf938461a4a2c30f49eb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3bb7914b51ba037648d9900db6a651dd5a2a58edec2aaf938461a4a2c30f49eb.exe
Resource
win10v2004-20230703-en
General
-
Target
3bb7914b51ba037648d9900db6a651dd5a2a58edec2aaf938461a4a2c30f49eb
-
Size
369KB
-
MD5
43849dd6034181d20855e9809ee6f439
-
SHA1
6c1bc1c11f2802b9225fc4fd0cf8f42cd08c7a94
-
SHA256
3bb7914b51ba037648d9900db6a651dd5a2a58edec2aaf938461a4a2c30f49eb
-
SHA512
30a0c34ca809478d1e1355afd6eb17ae235b34baf8b86c19f9f04ff57c3b48f42ae377b1aaed09d55a6ba4aa9e92afce9066a03c4cf0bab6e98c8e72e0ab9e78
-
SSDEEP
6144:h/ayxTAuTKoBrYGT/zdeD1LNExNpJwYjaY82692O+MwMB1V4nO30NH5VPrms2Xq:FbsuOoOozdeD1LCxN7wYjaY8244nMBEh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bb7914b51ba037648d9900db6a651dd5a2a58edec2aaf938461a4a2c30f49eb
Files
-
3bb7914b51ba037648d9900db6a651dd5a2a58edec2aaf938461a4a2c30f49eb.exe windows x64
5b7ea3602c6f9cc94803c5f6920acef2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msi
ord173
kernel32
GetFileSize
ReadFile
ExpandEnvironmentStringsW
WriteFile
GetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
MulDiv
GetModuleHandleW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FlushFileBuffers
GetModuleFileNameW
lstrcmpiW
LoadLibraryExW
InitializeCriticalSectionEx
RaiseException
SetThreadLocale
GetSystemDefaultLCID
DecodePointer
lstrlenW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetExitCodeThread
CreateThread
WaitForSingleObject
OpenProcess
GetExitCodeProcess
Sleep
CreateProcessW
GetCommandLineW
AddDllDirectory
CreateEventW
SetEvent
GlobalMemoryStatus
SetEnvironmentVariableW
SetCurrentDirectoryW
GetTimeFormatW
GetDateFormatW
GetUserDefaultLangID
VerifyVersionInfoW
VerSetConditionMask
CompareStringW
LCMapStringW
FlsFree
FindClose
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleOutputCP
GetConsoleMode
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
GetProcessHeap
HeapAlloc
HeapFree
CreateDirectoryW
RemoveDirectoryW
FindNextFileW
DeleteFileW
SetLastError
GetFullPathNameW
GetEnvironmentStringsW
FindFirstFileW
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
WriteConsoleW
FlsSetValue
user32
GetSysColor
GetFocus
SetFocus
SetCapture
GetCapture
DrawFocusRect
GetDlgCtrlID
GetCursorPos
ScreenToClient
IsWindowEnabled
FillRect
MessageBoxW
SetCursor
ReleaseCapture
TrackMouseEvent
PtInRect
SetRectEmpty
GetClassNameW
SystemParametersInfoW
GetWindowTextLengthW
GetWindowTextW
DrawTextW
OffsetRect
EnableWindow
DispatchMessageW
TranslateMessage
UpdateWindow
PeekMessageW
GetActiveWindow
GetMessageW
RegisterWindowMessageW
PostThreadMessageW
EndPaint
BeginPaint
LoadCursorW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
GetWindowLongPtrW
GetSystemMetrics
SetWindowLongPtrW
InvalidateRect
RedrawWindow
IsWindowVisible
ShowWindow
EndDialog
CreateWindowExW
IsWindow
SendMessageW
SetWindowLongW
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
MapWindowPoints
SetWindowPos
SetWindowTextW
GetDlgItem
UnregisterClassW
DestroyWindow
DefWindowProcW
CharNextW
ReleaseDC
GetClientRect
GetDC
LoadStringW
DialogBoxParamW
gdi32
SetTextColor
GetStockObject
CreateFontIndirectW
GetObjectW
BitBlt
SelectObject
CreateCompatibleDC
DeleteDC
CreateCompatibleBitmap
DeleteObject
SetBkMode
advapi32
CryptAcquireContextW
RegOpenKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
CryptDestroyHash
CryptHashData
CryptDestroyKey
CryptDeriveKey
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
CryptDecrypt
RegCreateKeyExW
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
PathIsUNCW
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ