Static task
static1
Behavioral task
behavioral1
Sample
3f088680373a596424b7a461b773ead926f93445a56a2ff9d65875863ed625c3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3f088680373a596424b7a461b773ead926f93445a56a2ff9d65875863ed625c3.exe
Resource
win10v2004-20230915-en
General
-
Target
3f088680373a596424b7a461b773ead926f93445a56a2ff9d65875863ed625c3
-
Size
416KB
-
MD5
381f8396feb9d1d0b52911c7bcb8867b
-
SHA1
86d7bbf9a9e891cf75d416776e56df07fefddaa1
-
SHA256
3f088680373a596424b7a461b773ead926f93445a56a2ff9d65875863ed625c3
-
SHA512
07fa2652890bfdca9363d819f78b224e8db73946a85ff54ad8a331ed7630653b1f1b311020fcc5379b63e8280877dfc680175f6ce244641c1667686a4ce74eae
-
SSDEEP
12288:rSXiav7Nwt8OVYPqo3YlgaApwBhvBJ/+GIISY1Ac:WS4qiYlFAuBhvn/++1H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f088680373a596424b7a461b773ead926f93445a56a2ff9d65875863ed625c3
Files
-
3f088680373a596424b7a461b773ead926f93445a56a2ff9d65875863ed625c3.exe windows:6 windows x64
6aed8a1d48749f3ad36c3c72bcf9aeb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindClose
FindFirstFileW
FindNextFileW
GetVersionExW
GetCurrentDirectoryW
FindResourceW
FreeLibrary
LoadLibraryExW
LoadLibraryW
GetProcAddress
GetSystemDirectoryW
GetModuleHandleW
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
IsDBCSLeadByte
GetModuleHandleExW
GetShortPathNameW
GetTempPathW
Sleep
SetCurrentDirectoryW
GetCommandLineW
GetEnvironmentVariableW
CreateProcessW
CopyFileW
MoveFileExW
SetStdHandle
MoveFileW
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
HeapAlloc
HeapFree
ExitProcess
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RtlUnwindEx
RaiseException
RtlPcToFileHeader
LocalFree
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
GetCurrentProcessId
SetFileAttributesW
RemoveDirectoryW
GetDiskFreeSpaceExW
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
FlushFileBuffers
CreateFileW
ExpandEnvironmentStringsW
GetStdHandle
SetLastError
GetLastError
GetModuleFileNameW
WaitForSingleObject
CloseHandle
GetFileAttributesW
DeleteFileW
CreateDirectoryW
GetStringTypeW
ReadConsoleW
HeapSize
WriteConsoleW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
user32
SetWindowTextW
InvalidateRect
EnableWindow
ShowWindow
SendMessageW
GetParent
DialogBoxParamW
GetDlgItem
EndDialog
LoadIconW
GetSysColor
SetForegroundWindow
SendDlgItemMessageW
MessageBoxW
GetDesktopWindow
ReleaseDC
GetDC
IsWindowVisible
IsWindow
CharUpperW
LoadStringW
GetWindow
GetClassNameW
SetProcessDefaultLayout
GetWindowLongPtrW
SetWindowLongW
GetWindowLongW
GetWindowRect
GetClientRect
GetSystemMetrics
SetWindowPos
OemToCharA
IsDlgButtonChecked
CheckDlgButton
GetDlgItemTextW
SetDlgItemTextW
gdi32
CreateFontW
GetDeviceCaps
DeleteObject
advapi32
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHFileOperationW
ShellExecuteExW
SHGetFolderPathW
SHChangeNotify
ShellExecuteW
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ole32
OleUninitialize
OleInitialize
CoCreateInstance
CoSetProxyBlanket
oleaut32
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ