Static task
static1
Behavioral task
behavioral1
Sample
37a2af76261e9e3082bd888296771fb69246b60459f2edb14f8bc41571df6e27.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
37a2af76261e9e3082bd888296771fb69246b60459f2edb14f8bc41571df6e27.exe
Resource
win10v2004-20230703-en
General
-
Target
37a2af76261e9e3082bd888296771fb69246b60459f2edb14f8bc41571df6e27
-
Size
505KB
-
MD5
08098ddc543bca53721b8aabd02b9f93
-
SHA1
68b002b1449a392aa8026b176abe2da5a7d47d7e
-
SHA256
37a2af76261e9e3082bd888296771fb69246b60459f2edb14f8bc41571df6e27
-
SHA512
5b469fd145616bff2880f2fd8bc8764a2103338754cec1cd8928e5c0e744b06bfb630697d0ecfb808ed4ff43ea3768fcbee487aa34f23ec1dc6e174252970d3e
-
SSDEEP
3072:RuLMfWS1cDBAbY0/DgcZf0F/pstBaDqwONnct437Bl3N2Uyc:RvKNomcB0F/p/uwONct43j92UJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37a2af76261e9e3082bd888296771fb69246b60459f2edb14f8bc41571df6e27
Files
-
37a2af76261e9e3082bd888296771fb69246b60459f2edb14f8bc41571df6e27.exe windows x64
1d042143ed7a7dfc666815d23130b954
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
VerQueryValueW
mfc140u
ord14088
ord12212
ord7719
ord14288
ord6121
ord14290
ord6123
ord14289
ord6122
ord3731
ord5706
ord11921
ord11929
ord4445
ord7920
ord10124
ord11933
ord11901
ord12606
ord5555
ord9941
ord6614
ord13545
ord7054
ord13109
ord940
ord1489
ord7716
ord1450
ord983
ord7393
ord10070
ord4947
ord2415
ord1503
ord8058
ord12600
ord12563
ord11813
ord10704
ord11085
ord3308
ord3307
ord3071
ord6000
ord13397
ord2697
ord11855
ord8926
ord8901
ord6287
ord12240
ord266
ord13767
ord1670
ord265
ord7551
ord8731
ord286
ord4335
ord280
ord11665
ord1369
ord878
ord3951
ord4946
ord8161
ord10163
ord3599
ord2212
ord2187
ord6341
ord3095
ord3094
ord3253
ord3252
ord1053
ord6251
ord8817
ord3056
ord4078
ord1383
ord6555
ord3144
ord3266
ord7235
ord1091
ord6250
ord2011
ord3756
ord296
ord1033
ord3748
ord2270
ord1089
ord450
ord3713
ord7394
ord12625
ord7546
ord1111
ord990
ord1454
ord8900
ord9946
ord7922
ord5227
ord7450
ord7461
ord7460
ord5916
ord5062
ord5229
ord5083
ord5582
ord5339
ord9041
ord5552
ord2689
ord1491
ord2370
ord5363
ord5080
ord10727
ord11664
ord11850
ord3172
ord3278
ord3279
ord3812
ord11806
ord2629
ord5723
ord13354
ord11406
ord6631
ord14217
ord7651
ord14211
ord2967
ord4352
ord9384
ord4360
ord4828
ord4767
ord4752
ord4814
ord4859
ord4782
ord4837
ord4853
ord4794
ord4800
ord4806
ord4788
ord4843
ord4776
ord1755
ord1734
ord1748
ord1722
ord1700
ord11940
ord11944
ord13513
ord3173
ord8947
ord10691
ord6729
ord11902
ord8656
ord14209
ord11625
ord3718
ord11771
ord8830
ord11415
ord11414
ord5451
ord6320
ord7668
ord9979
ord9975
ord9977
ord9978
ord9976
ord14360
ord2698
ord7913
ord3209
ord3212
ord13401
ord6002
ord6866
ord3949
ord6905
ord2431
ord4011
ord9089
ord14216
ord7650
ord14210
ord2907
ord2427
ord2903
ord12763
ord12746
ord290
ord8167
ord2475
ord6247
ord7813
ord13345
ord8084
ord2473
ord1086
ord438
ord6313
ord2344
ord7118
ord2213
ord8049
ord4324
ord4655
ord13618
ord12544
ord8023
ord13679
ord357
ord12967
ord4721
ord285
ord5709
ord2921
ord1157
ord8822
ord3096
ord5183
ord2439
ord12222
ord4656
ord12223
kernel32
FindFirstFileW
FindNextFileW
FindClose
InitializeCriticalSectionAndSpinCount
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
GetLastError
InitializeCriticalSectionEx
OutputDebugStringW
CloseHandle
GetFileSizeEx
CreateFileW
WideCharToMultiByte
VerifyVersionInfoW
VerSetConditionMask
GlobalUnlock
GlobalFree
GlobalLock
GlobalAlloc
GetFileAttributesW
CreateThread
FindResourceW
LoadResource
LockResource
SetThreadUILanguage
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
user32
EmptyClipboard
SetClipboardData
CloseClipboard
MonitorFromWindow
GetDC
ReleaseDC
LoadImageW
GetKeyState
InvalidateRect
CopyRect
FillRect
DrawIconEx
OffsetRect
DrawTextW
RedrawWindow
EnableWindow
DrawIcon
GetClientRect
OpenClipboard
GetSystemMetrics
IsIconic
LoadIconW
GetKeyboardState
SendMessageW
SystemParametersInfoW
gdi32
CreateFontW
Rectangle
SetDCPenColor
GetStockObject
TextOutW
BitBlt
CreateCompatibleBitmap
GetViewportOrgEx
GetMapMode
CreateCompatibleDC
SelectObject
GetTextExtentPoint32W
CreateFontIndirectW
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
CryptGetHashParam
CryptReleaseContext
CryptDestroyHash
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
CryptCreateHash
CryptDestroyKey
CryptHashData
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
DragFinish
DragQueryFileW
comctl32
InitCommonControlsEx
ole32
CoInitializeEx
CoCreateInstance
CoTaskMemFree
msvcp140
?always_noconv@codecvt_base@std@@QEBA_NXZ
?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z
?_Throw_C_error@std@@YAXH@Z
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??Bid@locale@std@@QEAA_KXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Xlength_error@std@@YAXPEBD@Z
_Mtx_trylock
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
api-ms-win-shcore-scaling-l1-1-1
GetDpiForMonitor
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
wcsrchr
__std_exception_copy
__std_exception_destroy
memset
__C_specific_handler
__current_exception
__current_exception_context
memcpy
memmove
_CxxThrowException
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_set_app_type
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
_configure_wide_argv
_exit
exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-heap-l1-1-0
calloc
_set_new_mode
free
api-ms-win-crt-stdio-l1-1-0
__p__commode
fclose
_get_stream_buffer_pointers
fread
fwrite
fgetpos
_fseeki64
fsetpos
setvbuf
fflush
ungetc
fputc
fgetc
_set_fmode
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
api-ms-win-crt-math-l1-1-0
__setusermatherr
floor
pow
log
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 432KB - Virtual size: 431KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ