Static task
static1
Behavioral task
behavioral1
Sample
3cb31314a5e8c115ff5a05f0da87c913b180657adae5ffa46151bfd6fe43c835.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3cb31314a5e8c115ff5a05f0da87c913b180657adae5ffa46151bfd6fe43c835.exe
Resource
win10v2004-20230915-en
General
-
Target
3cb31314a5e8c115ff5a05f0da87c913b180657adae5ffa46151bfd6fe43c835
-
Size
2.5MB
-
MD5
24e207d45b601336647115896510599c
-
SHA1
37bc50772d6d7d1d39c3ab7118d3796197001930
-
SHA256
3cb31314a5e8c115ff5a05f0da87c913b180657adae5ffa46151bfd6fe43c835
-
SHA512
df5ded4971cb224f63be272b77a3599be8355bd92fc7a25e9f51d57ad64a55b30bfb746f005eb6c196c380fe2b74dd9daafd329085fe4beb639271e378c6d1d2
-
SSDEEP
49152:a1nmpQmzGLU7Nzz8+PIsvlr6w1Dc+rng3OrzCo:a5muYOU7/Istr6wpc+rg3Op
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cb31314a5e8c115ff5a05f0da87c913b180657adae5ffa46151bfd6fe43c835
Files
-
3cb31314a5e8c115ff5a05f0da87c913b180657adae5ffa46151bfd6fe43c835.exe windows:4 windows x86
7308e350166170cf03c3475d48fce64c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalAlloc
FormatMessageA
HeapSize
HeapReAlloc
GetProfileStringA
GetLastError
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetTickCount
CloseHandle
WriteFile
CreateFileA
GetProcAddress
LoadLibraryA
lstrcmpA
GetModuleFileNameA
LoadResource
FindResourceA
LockResource
GlobalFree
GlobalUnlock
GlobalLock
GetModuleHandleA
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
GetCurrentThreadId
lstrcatA
GetVersion
FreeLibrary
InterlockedIncrement
WideCharToMultiByte
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrlenW
GetThreadLocale
SetLastError
MulDiv
GetACP
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RaiseException
GetCommandLineA
GetStartupInfoA
TerminateProcess
ExitProcess
RtlUnwind
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcess
DuplicateHandle
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
SizeofResource
GlobalFlags
lstrcpynA
GlobalAlloc
GetCurrentThread
LocalFree
user32
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
LoadStringA
DestroyMenu
GetSysColorBrush
GetDesktopWindow
PtInRect
GetClassNameA
InflateRect
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
MapDialogRect
SetWindowContextHelpId
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
CharNextA
wvsprintfA
ReleaseDC
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
PostMessageA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
EnableWindow
wsprintfA
GetClientRect
SendMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
InvalidateRect
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
RegisterClipboardFormatA
CharUpperA
PostThreadMessageA
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
DefDlgProcA
IsWindowUnicode
LoadIconA
BringWindowToTop
GetWindowRect
UpdateWindow
LoadCursorA
LoadBitmapA
SetTimer
IsWindowEnabled
GetDlgItem
GetWindowLongA
GetParent
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetDC
gdi32
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
RestoreDC
DeleteObject
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
GetMapMode
CreateFontIndirectA
DPtoLP
LPtoDP
SaveDC
GetStockObject
GetBkColor
GetTextColor
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
BitBlt
GetObjectA
GetDeviceCaps
GetTextMetricsA
StartDocA
StartPage
TextOutA
EndPage
DeleteDC
CreateDIBitmap
GetTextExtentPointA
EndDoc
comdlg32
PrintDlgA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
VariantChangeType
VariantCopy
SysAllocStringByteLen
VarBstrFromCy
SysAllocStringLen
VariantTimeToSystemTime
SysStringLen
GetErrorInfo
Sections
.text Size: 276KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ