Static task
static1
Behavioral task
behavioral1
Sample
3749877c658f5d213b1c3fda85c190ab4298f9ab649ac4f2cdab2a3db48aa22b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3749877c658f5d213b1c3fda85c190ab4298f9ab649ac4f2cdab2a3db48aa22b.exe
Resource
win10v2004-20230703-en
General
-
Target
3749877c658f5d213b1c3fda85c190ab4298f9ab649ac4f2cdab2a3db48aa22b
-
Size
354KB
-
MD5
6dc36e69bc9e8b4cf84de71d70b5e095
-
SHA1
389d974826fd0d015b7f5f1325fb21c438e49133
-
SHA256
3749877c658f5d213b1c3fda85c190ab4298f9ab649ac4f2cdab2a3db48aa22b
-
SHA512
1f95d45733a5ad3bf302647844be347f6fe888da52ff6434d087eceb6533d7d7c1e9cf1dd3ef0e4b6b150ecb1a55193664cddcc0efedd3f6decfaa0a6bc1a865
-
SSDEEP
6144:FxA2QU67aPjjJ4YYB/A9Ue/41He9PR+2T34G04WaSMBf1XQJMcw/S1yW1kdY/:FxA2QU67aPjjJ4YYB/A9Ue/41He9PR+w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3749877c658f5d213b1c3fda85c190ab4298f9ab649ac4f2cdab2a3db48aa22b
Files
-
3749877c658f5d213b1c3fda85c190ab4298f9ab649ac4f2cdab2a3db48aa22b.exe windows x86
c16a5dd09d338dc2da9663a01063e40b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlAssert
RtlUnicodeStringToInteger
advapi32
BackupEventLogW
ClearEventLogW
CloseEventLog
ConvertSidToStringSidW
EqualSid
GetNumberOfEventLogRecords
IsValidSid
LookupAccountSidW
OpenBackupEventLogW
OpenEventLogW
ReadEventLogW
RegCloseKey
RegConnectRegistryW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
comctl32
ImageList_Create
ImageList_ReplaceIcon
InitCommonControlsEx
PropertySheetW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
kernel32
CloseHandle
CreateEventW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetCommandLineW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesExW
GetLastError
GetLocaleInfoW
GetModuleHandleA
GetNumberFormatW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocalFree
MulDiv
QueryPerformanceCounter
ResumeThread
RtlUnwind
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
_wtol
abort
calloc
exit
fprintf
free
fwrite
iswctype
malloc
memmove
memset
signal
strncmp
swprintf
swscanf
towupper
vfprintf
wcschr
wcscpy
wcslen
wcsncpy
wcsstr
wcstok
shell32
CommandLineToArgvW
ShellAboutW
ShellExecuteW
shlwapi
StrFormatByteSizeW
gdi32
CreateFontIndirectW
DeleteObject
GetDeviceCaps
user32
BeginDeferWindowPos
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
CloseClipboard
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DeferWindowPos
DestroyWindow
DialogBoxParamW
DispatchMessageW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EndDialog
GetCapture
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetDlgItemTextW
GetFocus
GetMenu
GetMessageW
GetParent
GetScrollInfo
GetSysColor
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowRect
InvalidateRect
IsWindow
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OpenClipboard
PostQuitMessage
RegisterClassExW
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindowEx
SendDlgItemMessageW
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetScrollInfo
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowScrollBar
ShowWindow
TranslateAcceleratorW
TranslateMessage
UpdateWindow
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 74KB - Virtual size: 73KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ