F���]X��d�|E�<�"���E�^o����ץ�����S�<P����ӹ� �˾i�C�Y� ����{Zi�zO�J���\5J��cLI�|�!b����oA��� 0G���Hl 1�-����(d�R��`�]ե߭[a�3y��oX1Ă*���4� ��0r���U������\锡�UZm #��"�y���[|* *��fQ}�#G`�;O�Ҟ�������o=LJ���E��tۙ���)%��r;����,���-5r\�F[���?m�2��nZqg;�R���cB�C�N�`i���������؈�c�t��#$����J�"ɏ�}6� M���C�4�v�;��Аb2�M���V��x �Z�ymI���z&�&�S �&�1��߁����t80�8Y,qxh/^�+)l�DPI4?"�ba���F�D1V�gS�y����'���>��Z7����[���C�V�H'I^�b��E�������-j����4���=�]�% ���l��j�I3�Z ��]U���������{^OGw����Yd��˖��R��%���Y��T�i��`]�'"�p�{�����9 }�G1+� �d,�3㢜J�/�kX���SÕ�I��+��r�pʏ�Xk�e[�b/~F f���^Y}�;�� ]�r���0���� �O{eQ6���U�l��.y#a4��ȉ�:�sN>ۯ��%(}eB� Cܡo���D���n���/4������)ο�J�V�G��Xo��*1���3��T�qhZTL}�*�{����Q�LN G���b�)�D���R���5�BXA��U���X�T�[% =��phn�l7�2�!�% 6��{�r�l�2׳�m����(�~yO��.7}bm���}Z�� mv\��B���<y�* �����x�&���>"����ˈT����컹���#�yۚ >�%Ԣ��2��0,\ᬟj���������a76��v8��8�+&3���<F���o=� <,i���sv���:D��n��N�5�m�ʜ��ȼ%d�W�y'�"6T6@������y��5k��j%�z���������`F�[��W�5xw�����j ���ϻ�.�����@�Ӎ��������pkC���}7���5<5Ӓ�v?hy�v�X;�Cg�M�f�sm�s+L��-��Tn���}g]��ATU�=h{�s�K��.J���Aܭ�W�c.Qi�xW�D.����[�*�F��#D3C9{�kd�8��u&��W��vK)�}pՄ9p�?��1 ����褃�.��)���~�h�vԼ3�ӱ:�w<BA`�H�ǃ��>1�Dz�VQ/���B�F���Y��#M�C�������V�$KQ�S ���C�E�6%���1��9���>vm�/�f��2�����s���|PQ:������md��[�M��V��\C����� 2�Y��/��D�� ޖ��MU�O�s�TȨL�9�k���&���$��'�7EO��j-������1ނ�#�{/XA�Ί�����le�䵧yٕp�z��b.���b���S��.�݁��NZw��)%{��;S�x����H��-T�[z� -�9��^�p�^%PWS昉MiuV��^.����;��y� .��*m���_��QN7���ݹH���5���V#8�/b)u��c��K��-�d˔w'�cx$Vl 7�L�d�1���vy�Äfj㋫K�7���>2'��,n�9�5Љ�N�q����i#;�]8�Xh2���K��]z`Ɵ@9o �,��e(��1�p�@�e.���<�|zv�.ʣ�E�з'u��0�07f�h��� �%�>��4�1���,�������/i3^?���=-���g�K'�@Q��pb�l#D���j��ZȰ�y��^��ɔ��-Ю���Ei�T� ���+n��2"=�g��B����!6W�L�8) it>p�e��A�ʹ�BH㡛(����HhS��l�p�s3n��T�9"�Ӈ0�7��¦LW@��J�Σ���w��2~�껺$@�Kt����,� "�F�K�Jk�{�����ɫVD:/�@�4c�A)h�_�詛CX�A�Wv�b��R�4��Ǯ˗@��m�$�"Tʋ4��Y�O�h6�:9���1͠Q|I3o��C���1�W��1����J�"\(H���Cz��a�N�A�����cw���A#����&5�F;[K=��S6���\t�]ܛm��w7�|�샐�g��^�ے��!���� ̉r���?F�A�:� $ȸ�D�v�@|��v.v�FV����VQg�k_#�6|A��T㶮���P�>�:)����Ï����Th�)���ȍ�=�!���@9E9n�Fg��r���.Z��壡�R-�H�&�45�i�h"��;���<�Ż̷�9Um�O��4�\��RN���e�qz3 ����I��eM���ֆv��¾9��Fϟ )=�R �5�eW��hjr��G���3����"Pi��2EF����!���ǒ�۞7)@��;5^U-�<Q��I����t���¸��ܞ�S�����em핖��m�4J�r�{S܆��c���qsD3Q�����Pî�F����m0�w�����{N�WB��X�{�ِ�_LN��z�x�+�og�,�d�e(�ԧ�����!Yp`G #6%��l����@E�=��Jw����(�C�KٳB��'��1�����vF���v%������9q-,?�L��B����E�#u�\��m�����?9�b�p� C��V�i�=�=�n��$����ߐ&��}b��☾X�I�$�>�㥭9<�Ҭ��B��.y-�����@��ܭ �[]�^���zT����-^��x�����R���,�r���Da���㭄��[��fɫ�j/��H�+Q^)�{bZ���C�^@L'��z9�c�-���TAT4��^�S/+�7N���D/q������K_@���!�$f �c��$O�/_CTPb&�)3ȿn��x��6������vrb{��L�����c^�Av08(�lե��UHc�Q���8��6)
Static task
static1
Behavioral task
behavioral1
Sample
3b46779fa200140c84b7ef814466a97b3bee8af54d44e73719482acd975b5e8a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3b46779fa200140c84b7ef814466a97b3bee8af54d44e73719482acd975b5e8a.exe
Resource
win10v2004-20230915-en
General
-
Target
3b46779fa200140c84b7ef814466a97b3bee8af54d44e73719482acd975b5e8a
-
Size
7.0MB
-
MD5
6b11cd3b0d392f8fa0a607bf7f3705a8
-
SHA1
0ad1f935c510644c732008a2dde9c98a238bc623
-
SHA256
3b46779fa200140c84b7ef814466a97b3bee8af54d44e73719482acd975b5e8a
-
SHA512
e35ff3635d2896455df2e253c7fdc372831780ae16bb1e3f620a5608a1954cf42e5f41f737022ad4fd993302dbaa45f584fa02f1619cfeef102cda4cfb700013
-
SSDEEP
98304:8KTaFZdgAOQTuMink+UaFSbtSN+MgLpkKzzSTqsEjc75fFqW/BmIJakiPpU1x:AbiKaFSbt0ZaWiSTHEodfFn3M/he
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b46779fa200140c84b7ef814466a97b3bee8af54d44e73719482acd975b5e8a
Files
-
3b46779fa200140c84b7ef814466a97b3bee8af54d44e73719482acd975b5e8a.exe windows x86
e71496516126c4ba7c6af0fc223dd008
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
OpenProcess
CreateToolhelp32Snapshot
Process32First
SizeofResource
GetModuleFileNameA
Sleep
LocalAlloc
CreateEventA
CreateThread
WaitForSingleObject
ExpandEnvironmentStringsA
WriteFile
ReadFile
GetFileSize
CreateFileA
GetLastError
CloseHandle
SetFileAttributesA
GetFileAttributesExA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
SetFilePointer
SetStdHandle
Process32Next
CreateFileW
WriteConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LoadLibraryW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetCommandLineA
HeapSetInformation
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetSystemTimeAsFileTime
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
VirtualQuery
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
DeleteService
QueryServiceStatus
ControlService
OpenServiceA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
CreateProcessAsUserA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
shlwapi
PathFileExistsA
ws2_32
inet_ntoa
WSACleanup
gethostbyname
gethostname
WSAStartup
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
user32
CharUpperBuffW
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx0 Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.upx1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx2 Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE