Static task
static1
Behavioral task
behavioral1
Sample
3c1bc9db3fcaf69efb871c79cfcaae649cb476110b3b97f7490c0142139b2008.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3c1bc9db3fcaf69efb871c79cfcaae649cb476110b3b97f7490c0142139b2008.exe
Resource
win10v2004-20230915-en
General
-
Target
3c1bc9db3fcaf69efb871c79cfcaae649cb476110b3b97f7490c0142139b2008
-
Size
10.8MB
-
MD5
5dd5f0c61f89321e537c4284b3244832
-
SHA1
433d10599c48748de30411c2d0e7e06dfcb661cd
-
SHA256
3c1bc9db3fcaf69efb871c79cfcaae649cb476110b3b97f7490c0142139b2008
-
SHA512
9703956dd159611969cbe7946e5d0c561e81c3f86e132e4248fda93024864c8c7b3007527254e8ced663e78d9c3194dd12bc784cb14f5cd4d9647a96f048adfb
-
SSDEEP
196608:ygstyxFz8YlcPfBZyuM8oCwbJsv6tWKFdu9C9IN:OkAJDM8oCwbJsv6tWKFdu9CGN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c1bc9db3fcaf69efb871c79cfcaae649cb476110b3b97f7490c0142139b2008
Files
-
3c1bc9db3fcaf69efb871c79cfcaae649cb476110b3b97f7490c0142139b2008.exe windows x86
4a9d01db520890c6b97127fd0ace4934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
CopyFileW
MoveFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
VirtualQuery
OpenFileMappingW
ResetEvent
MultiByteToWideChar
WideCharToMultiByte
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
GetCurrencyFormatW
GetUserDefaultUILanguage
GetSystemDirectoryW
FindFirstFileExW
FindNextFileW
ReleaseSemaphore
CreateSemaphoreW
FreeLibrary
GetModuleHandleExW
GetTimeZoneInformation
GetGeoInfoW
GetUserGeoID
OpenProcess
LoadLibraryA
ExitProcess
SetHandleInformation
lstrcmpW
GetVolumeInformationW
GetDriveTypeW
IsValidLanguageGroup
IsValidLocale
ExpandEnvironmentStringsW
CreateProcessW
GetUserDefaultLangID
CheckRemoteDebuggerPresent
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalSize
MoveFileExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseMutex
CreateMutexW
VirtualAlloc
VirtualFree
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
HeapReAlloc
AreFileApisANSI
ExitThread
LoadLibraryExW
SetStdHandle
SetFileAttributesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
HeapSize
SetLastError
GetProcessHeap
DeviceIoControl
GetModuleFileNameA
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEnvironmentVariableA
WriteConsoleW
LCMapStringW
EnumSystemLocalesW
GetStringTypeW
FindFirstChangeNotificationW
FindCloseChangeNotification
GetTempPathW
RemoveDirectoryW
GetLongPathNameW
GetFullPathNameW
GetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
SetErrorMode
WriteFile
SetFilePointerEx
SetEndOfFile
ReadFile
GetLogicalDrives
GetFileType
FlushFileBuffers
CreateFileW
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameW
GetStartupInfoW
WaitForSingleObjectEx
GetConsoleWindow
OutputDebugStringW
GetLocalTime
GetSystemTime
FormatMessageW
GetProcAddress
GetModuleHandleW
WaitForMultipleObjects
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ResumeThread
TerminateThread
GetCurrentProcess
GetThreadPriority
SetThreadPriority
GetCurrentThreadId
GetCurrentThread
CreateThread
Sleep
CreateEventW
WaitForSingleObject
SetEvent
GetLastError
DuplicateHandle
LocalFree
GetCurrentProcessId
GetCommandLineW
GetUserDefaultLCID
CompareStringW
FindNextChangeNotification
CreateDirectoryW
GetCurrentDirectoryW
GetStdHandle
GetVolumeInformationA
CreateProcessA
CloseHandle
SetUnhandledExceptionFilter
TerminateProcess
InitializeCriticalSection
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
netapi32
Netbios
user32
NotifyWinEvent
SetCursorPos
GetCursor
LoadCursorW
CreateCursor
CreateIconIndirect
GetIconInfo
GetCursorInfo
GetClipboardFormatNameW
TrackMouseEvent
GetMessageExtraInfo
GetWindowTextW
EnumWindows
RealGetWindowClassW
SetMenuItemInfoW
TrackPopupMenuEx
GetMenu
MapVirtualKeyW
ToUnicode
ToAscii
GetKeyboardState
GetKeyState
IsZoomed
SetCaretPos
DrawIconEx
HideCaret
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
DefWindowProcW
RegisterClassW
UnregisterClassW
CreateWindowExW
DestroyWindow
GetQueueStatus
MsgWaitForMultipleObjectsEx
SetTimer
DestroyCaret
CreateCaret
GetKeyboardLayout
GetAsyncKeyState
RegisterClipboardFormatW
ChildWindowFromPointEx
GetCursorPos
GetClientRect
GetFocus
RegisterClassExW
GetClassInfoW
GetKeyboardLayoutList
GetAncestor
DestroyCursor
SetParent
GetParent
ScreenToClient
ClientToScreen
SetCursor
AdjustWindowRectEx
GetWindowRect
SetWindowTextW
InvalidateRect
ChangeClipboardChain
SetClipboardViewer
LoadIconW
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
KillTimer
GetWindowLongW
SetWindowLongW
SetWindowsHookExW
SetWindowPlacement
UnhookWindowsHookEx
CallNextHookEx
CharNextExA
MessageBoxW
SystemParametersInfoW
GetDC
ReleaseDC
GetSystemMenu
EnableMenuItem
RegisterWindowMessageW
SendMessageW
GetSystemMetrics
GetWindowThreadProcessId
DestroyIcon
GetSysColor
SetWindowRgn
GetDoubleClickTime
GetUpdateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
ReleaseCapture
SetCapture
GetCapture
SetFocus
IsIconic
IsWindowVisible
GetWindowPlacement
SetWindowPos
MoveWindow
FlashWindowEx
ShowWindow
IsChild
AttachThreadInput
GetDesktopWindow
GetCaretBlinkTime
MessageBeep
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHGetFileInfoW
Shell_NotifyIconW
SHGetSpecialFolderPathW
CommandLineToArgvW
ole32
ReleaseStgMedium
DoDragDrop
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CoInitialize
CoCreateInstance
CoUninitialize
CoGetMalloc
advapi32
OpenProcessToken
CopySid
FreeSid
GetLengthSid
GetTokenInformation
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegFlushKey
RegSetValueExW
ws2_32
WSASendTo
WSASend
WSARecvFrom
WSARecv
WSANtohs
WSANtohl
WSAIoctl
WSAHtonl
WSAConnect
WSAAccept
setsockopt
select
listen
htons
WSASocketW
getpeername
closesocket
bind
WSAGetLastError
gethostbyname
gethostbyaddr
ntohl
inet_addr
getsockopt
htonl
WSAAsyncSelect
WSACleanup
WSAStartup
gethostname
getsockname
__WSAFDIsSet
gdi32
CreateBitmap
CombineRgn
CreateCompatibleDC
CreateRectRgn
DeleteDC
DeleteObject
GetRegionData
SelectClipRgn
SelectObject
CreateDIBSection
GdiFlush
BitBlt
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateDCW
EnumFontFamiliesExW
CreateFontIndirectW
GetFontData
GetStockObject
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
GetCharABCWidthsI
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
SetWorldTransform
ExtTextOutW
GetDIBits
oleaut32
SysFreeString
SysStringLen
VariantInit
VariantChangeType
SysAllocStringLen
SystemTimeToVariantTime
SysAllocString
imm32
ImmAssociateContext
ImmGetVirtualKey
ImmSetCandidateWindow
ImmGetDefaultIMEWnd
ImmGetContext
ImmReleaseContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCompositionWindow
winmm
PlaySoundW
Sections
.text Size: 6.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ