Static task
static1
Behavioral task
behavioral1
Sample
c3a2018f409efc6a4fd4bfcadcdd9517e1e49b39c86b0d8ebd66674e49906511.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c3a2018f409efc6a4fd4bfcadcdd9517e1e49b39c86b0d8ebd66674e49906511.exe
Resource
win10v2004-20230915-en
General
-
Target
c3a2018f409efc6a4fd4bfcadcdd9517e1e49b39c86b0d8ebd66674e49906511
-
Size
648KB
-
MD5
b35e4bc60586122178869328a373fb09
-
SHA1
18eeec73e2e7476380c4cd012a7ba3efb6daf59b
-
SHA256
c3a2018f409efc6a4fd4bfcadcdd9517e1e49b39c86b0d8ebd66674e49906511
-
SHA512
b9b8013175357a0762a4286b0c43ea2353d0f4216a1c50866471367cb9a31d85c2b4782251054340eead822d96bd48fa157a3f4bf800d8e3b53ac9539676fadf
-
SSDEEP
12288:FuybPaYAAWZP47RJ/m3wLfTJQtxKSiFcO2Rq:wybP1jWZw73O3wLf1Qt8Sy+Rq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3a2018f409efc6a4fd4bfcadcdd9517e1e49b39c86b0d8ebd66674e49906511
Files
-
c3a2018f409efc6a4fd4bfcadcdd9517e1e49b39c86b0d8ebd66674e49906511.exe windows:4 windows x86
3ba7cb646aae461249afe50cc2469ae2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
OutputDebugStringA
GetTickCount
GetPrivateProfileIntA
GetPrivateProfileSectionA
lstrcatA
ExitProcess
GetModuleFileNameA
lstrcpyA
lstrlenA
CompareStringW
CompareStringA
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetFileAttributesA
CreateDirectoryA
GetFullPathNameA
WaitForSingleObject
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcessId
GetLastError
FormatMessageA
LocalFree
GlobalAlloc
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
MultiByteToWideChar
GetPrivateProfileStringA
DeleteFileA
WideCharToMultiByte
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RaiseException
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
GetCurrentDirectoryA
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetModuleHandleA
LCMapStringW
LCMapStringA
FlushFileBuffers
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapAlloc
HeapFree
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
TerminateProcess
GetCurrentProcess
GetDriveTypeA
HeapReAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
SetEnvironmentVariableA
user32
GetDesktopWindow
MessageBoxA
FillRect
MessageBoxW
GetActiveWindow
PostMessageA
ReleaseDC
GetDC
gdi32
GetTextCharset
GetFontData
CreateFontA
GetTextExtentPoint32A
GetEnhMetaFileA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
CreateSolidBrush
PlayEnhMetaFile
DeleteEnhMetaFile
DeleteObject
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
GetStockObject
SelectPalette
RealizePalette
GetDIBits
CreateFontIndirectA
advapi32
GetUserNameA
shell32
ShellExecuteA
cimage
?IncreaseBpp@CxImage@@QAE_NK@Z
?Destroy@CxImage@@QAE_NXZ
?GetPixelColor@CxImage@@QAE?AUtagRGBQUAD@@JJ_N@Z
?Load@CxImage@@QAE_NPBDK@Z
??0CxImage@@QAE@K@Z
?DeleteDecodeDataBuf@CxImage@@QAEXPAE@Z
?Encode@CxImage@@QAE_NAAPAEAAJK@Z
?GetSize@CxImage@@QAEJXZ
?SetPixelColor@CxImage@@QAEXJJK@Z
?SetPaletteColor@CxImage@@QAEXEK@Z
?Create@CxImage@@QAEPAXKKKK@Z
?ReadCCITTFaxDecodeData@CxImage@@QAEPAEPAEHAAH@Z
?Negative@CxImage@@QAE_NXZ
?Resample@CxImage@@QAE_NJJHPAV1@@Z
?Save@CxImage@@QAE_NPBDK@Z
?GetBits@CxImage@@QAEPAEK@Z
??0CxImage@@QAE@PAEKK@Z
Sections
.text Size: 476KB - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ