Static task
static1
Behavioral task
behavioral1
Sample
3c44a676c0ca31c798ce48d6fbd2a4c9a4492ac0ed4965fc3cad68d5d5c9741a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3c44a676c0ca31c798ce48d6fbd2a4c9a4492ac0ed4965fc3cad68d5d5c9741a.exe
Resource
win10v2004-20230831-en
General
-
Target
3c44a676c0ca31c798ce48d6fbd2a4c9a4492ac0ed4965fc3cad68d5d5c9741a
-
Size
1.6MB
-
MD5
f2918c03002395f7a391d1547af4a4e3
-
SHA1
6053ff30174b008d9e1e4aea0d9a2bbc61f33f3c
-
SHA256
3c44a676c0ca31c798ce48d6fbd2a4c9a4492ac0ed4965fc3cad68d5d5c9741a
-
SHA512
2101b9f3bcd1d0e0393fe2759452651500c17ce6d167fd25bc6562e0082cb272be480d6eed7aee8ba1782fbe782021cf69d4b9150e12fa3976454d81c8a42c21
-
SSDEEP
24576:w+xr167L7U/d4lWtctrlvZPThwDyz0EML/HjCedN+TvYiBxNjB4dSop2:w5L7UF4cWLNCDFvWedN+TgibNj+Fo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c44a676c0ca31c798ce48d6fbd2a4c9a4492ac0ed4965fc3cad68d5d5c9741a
Files
-
3c44a676c0ca31c798ce48d6fbd2a4c9a4492ac0ed4965fc3cad68d5d5c9741a.exe windows x86
ce46b612c9ce2b3b729e22b20517eb53
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
libcef
cef_browser_host_create_browser
cef_v8context_get_current_context
cef_v8value_create_string
cef_v8value_create_object
cef_v8value_create_function
cef_task_runner_get_for_thread
cef_string_list_size
cef_string_list_value
cef_string_list_append
cef_string_map_size
cef_string_map_key
cef_string_map_value
cef_string_map_append
cef_string_multimap_size
cef_string_multimap_key
cef_string_multimap_value
cef_string_multimap_append
cef_string_multimap_alloc
cef_stream_writer_create_for_handler
cef_get_extensions_for_mime_type
cef_quit_message_loop
cef_run_message_loop
cef_shutdown
cef_initialize
cef_stream_reader_create_for_file
cef_string_multimap_free
cef_execute_process
cef_post_delayed_task
cef_post_task
cef_currently_on
cef_api_hash
cef_command_line_get_global
cef_command_line_create
cef_string_map_free
cef_string_map_alloc
cef_string_list_free
cef_string_list_alloc
cef_cookie_manager_get_global_manager
cef_process_message_create
cef_string_userfree_utf16_free
cef_log
cef_drag_data_create
cef_string_utf16_set
cef_string_ascii_to_utf16
cef_string_wide_to_utf8
cef_string_utf16_cmp
cef_string_utf16_to_utf8
cef_string_utf8_clear
cef_string_utf8_to_utf16
cef_string_utf16_clear
opengl32
glVertex2f
glTexSubImage2D
glTexParameteri
glTexImage2D
wglCreateContext
glTexEnvf
glRotatef
glPushMatrix
glPushAttrib
glViewport
glPopAttrib
glPixelStorei
glOrtho
glMatrixMode
glLoadIdentity
glLineWidth
glInterleavedArrays
glBindTexture
glVertex2i
glHint
glGenTextures
glBegin
glPopMatrix
glBlendFunc
glEnd
glClear
glEnable
glDrawArrays
glDisable
wglDeleteContext
glDeleteTextures
glColor4f
glColor3f
glClearColor
wglMakeCurrent
gdiplus
GdiplusShutdown
GdiplusStartup
kernel32
GetStdHandle
ExitProcess
GetModuleHandleExW
ExitThread
RemoveDirectoryW
GetFullPathNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
CreateDirectoryW
GetFileAttributesExW
DeleteFileW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
GetProcAddress
OpenProcess
GetCurrentProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
GetCurrentThreadId
IsDebuggerPresent
WaitForMultipleObjects
CloseHandle
DuplicateHandle
CreateEventW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
CreateProcessW
SearchPathW
LocalFree
DecodePointer
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
GetLastError
SetLastError
DeleteCriticalSection
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
IsBadReadPtr
LockResource
FreeLibrary
TerminateProcess
CreateThread
Sleep
LoadResource
SizeofResource
LoadLibraryW
LoadLibraryExA
GetModuleFileNameA
OutputDebugStringW
FindResourceW
FindResourceExW
GetLocalTime
SetEvent
WaitForSingleObject
GetCommandLineW
GetTempPathW
GetFileAttributesW
lstrcpynW
lstrcatW
lstrlenW
GlobalAlloc
GlobalSize
GlobalLock
GlobalUnlock
FindClose
GetEnvironmentVariableW
FindFirstFileW
FindNextFileW
SetEnvironmentVariableW
GetWindowsDirectoryW
GetFileAttributesA
GetTickCount
GetPrivateProfileIntW
GetPrivateProfileStringW
SetErrorMode
GetEnvironmentVariableA
SetEnvironmentVariableA
VirtualProtect
VirtualFree
InterlockedCompareExchange
VirtualAlloc
GetCurrentThread
FlushInstructionCache
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
ReadFile
WriteFile
SetFilePointer
SetEndOfFile
CreateFileW
SetFileAttributesW
FlushFileBuffers
InitializeCriticalSection
ResetEvent
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryPerformanceCounter
GetStringTypeW
SwitchToThread
WaitForSingleObjectEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
GetACP
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetCurrentDirectoryW
SetStdHandle
OutputDebugStringA
user32
GetDC
ReleaseDC
BeginPaint
EndPaint
SetPropW
GetPropA
ReleaseCapture
SetCursor
GetCursorPos
ClientToScreen
GetSystemMetrics
WindowFromPoint
UnionRect
PtInRect
SetClassLongW
GetParent
LoadCursorW
LoadIconW
GetAncestor
GetMessagePos
OffsetRect
IsRectEmpty
EqualRect
FindWindowExW
MessageBoxW
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClipboardFormatW
LoadCursorA
ScreenToClient
SendMessageW
IsWindow
GetWindowThreadProcessId
RegisterWindowMessageW
PostMessageA
SetWindowPos
IsZoomed
SetPropA
GetPropW
GetClientRect
GetWindowRect
GetWindowLongW
SetWindowLongW
SetParent
TrackMouseEvent
GetMessageTime
DefWindowProcW
GetDoubleClickTime
RegisterClassExW
CreateWindowExW
IsChild
DestroyWindow
IsWindowVisible
SetFocus
GetKeyState
GetCapture
SetCapture
GetClassNameW
gdi32
GetDeviceCaps
DeleteObject
CreateRectRgn
PtInRegion
CombineRgn
SwapBuffers
SetRectRgn
ChoosePixelFormat
SetPixelFormat
comdlg32
GetOpenFileNameW
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
shell32
DragFinish
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
DragQueryFileW
ole32
OleUninitialize
OleInitialize
ReleaseStgMedium
DoDragDrop
CoTaskMemAlloc
RevokeDragDrop
RegisterDragDrop
CoTaskMemFree
oleaut32
SysAllocString
shlwapi
StrCpyW
StrStrIW
PathAppendA
PathRemoveFileSpecA
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
ws2_32
ntohl
WSAStartup
socket
htons
htonl
closesocket
WSACleanup
bind
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
Sections
.text Size: 983KB - Virtual size: 982KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 309KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared_ Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
qsbeco Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 179KB - Virtual size: 178KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE