Static task
static1
Behavioral task
behavioral1
Sample
3f365f163a7892f5ace940e605e4b6277b53898f64eea89ab76c7e19e9e1ca04.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3f365f163a7892f5ace940e605e4b6277b53898f64eea89ab76c7e19e9e1ca04.exe
Resource
win10v2004-20230915-en
General
-
Target
3f365f163a7892f5ace940e605e4b6277b53898f64eea89ab76c7e19e9e1ca04
-
Size
200KB
-
MD5
aed24d21adb1b03ee945086c5a09c20a
-
SHA1
dbed8a022bf3179b148f853cb2dda5f28bf27932
-
SHA256
3f365f163a7892f5ace940e605e4b6277b53898f64eea89ab76c7e19e9e1ca04
-
SHA512
6beb12f8254d9f52019ccb8b1b01480b209ed6094d239610a6babba721c5926ae954ab3c46d1395210d5a5f3b6c7b84af921da78fe456cae553e666b6257d6d6
-
SSDEEP
6144:S8uKTKUmVPu80YMrzHqqDLuQEPoOoe7J:FPOMrzKqnuDPxV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f365f163a7892f5ace940e605e4b6277b53898f64eea89ab76c7e19e9e1ca04
Files
-
3f365f163a7892f5ace940e605e4b6277b53898f64eea89ab76c7e19e9e1ca04.exe windows:5 windows x64
f0721225dc48b8509e1a4ad8b21b325f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mfc100u
ord4935
ord10841
ord2759
ord2858
ord2859
ord3362
ord10798
ord2286
ord5064
ord12208
ord10414
ord5910
ord13009
ord6837
ord13003
ord2577
ord3850
ord13687
ord3857
ord4256
ord4223
ord4219
ord4253
ord4274
ord4232
ord4261
ord4270
ord4240
ord4244
ord4248
ord4236
ord4265
ord4228
ord1497
ord1490
ord1492
ord1486
ord1479
ord10926
ord10928
ord12359
ord2760
ord8084
ord9734
ord5998
ord10892
ord7803
ord13001
ord10626
ord3282
ord10763
ord7957
ord13681
ord13680
ord13752
ord13769
ord13765
ord13767
ord13768
ord13766
ord2355
ord7088
ord2791
ord2794
ord12255
ord5340
ord2659
ord3608
ord7596
ord2530
ord3310
ord1877
ord2172
ord3854
ord5868
ord7968
ord2748
ord908
ord4200
ord1276
ord266
ord369
ord5582
ord8038
ord10845
ord2354
ord12251
ord5338
ord2663
ord2884
ord2885
ord9216
ord10101
ord9747
ord7870
ord10805
ord6451
ord3160
ord3242
ord3163
ord3249
ord3261
ord9770
ord1190
ord776
ord12581
ord3836
ord4623
ord5255
ord958
ord1288
ord5426
ord1868
ord410
ord286
ord2541
ord285
ord5052
ord5017
ord7315
ord3998
ord12840
ord7573
ord280
ord11517
ord2445
ord959
ord4043
ord411
ord957
ord2444
ord10642
ord409
ord5344
ord290
ord3704
ord1428
ord5019
ord12756
ord2029
ord2025
ord13017
ord2054
ord4115
ord7068
ord287
ord291
ord11012
ord1991
ord2140
ord468
ord1457
ord12841
ord265
ord1240
ord926
ord1270
ord7321
ord7246
ord11463
ord13475
ord4570
ord2117
ord11157
ord11158
ord13002
ord6836
ord13008
ord8221
ord3543
ord3484
ord11542
ord6853
ord1716
ord13782
ord10658
ord12889
ord11150
ord6898
ord13191
ord13188
ord13193
ord13190
ord13192
ord13189
ord3295
ord5049
ord10910
ord10918
ord7094
ord9189
ord10922
ord10891
ord11523
ord4473
ord4737
ord4907
ord8174
ord4715
ord4910
ord4476
ord4612
ord4457
ord6669
ord6670
ord6660
ord4610
ord7096
ord9019
ord8037
ord5894
ord878
ord9138
ord6609
ord11225
ord2449
ord9024
ord5570
ord885
ord3277
ord4199
ord1900
ord2019
ord3969
ord12926
ord310
ord890
ord4131
ord395
ord11713
ord946
ord469
ord324
ord2439
ord5025
ord1953
ord3486
ord891
ord3487
ord3942
ord3368
ord898
ord1005
ord1290
ord5790
ord296
ord12434
ord2023
ord12431
ord12436
ord12430
ord2850
ord1278
ord2050
msvcr100
_fmode
free
calloc
memset
malloc
_wtoi
memcpy
_amsg_exit
__wgetmainargs
__C_specific_handler
_CxxThrowException
__crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
__CxxFrameHandler3
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_cexit
_exit
_XcptFilter
kernel32
GetProcAddress
RemoveDirectoryW
lstrlenW
GetLastError
FindFirstFileW
SetFileAttributesW
DeleteFileW
FindNextFileW
FindClose
WinExec
GetModuleHandleW
LocalFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
SetEnvironmentVariableW
Sleep
LoadLibraryW
FreeLibrary
user32
LoadIconW
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageW
AppendMenuW
DrawIcon
GetSystemMetrics
advapi32
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyW
RegOpenKeyExW
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ole32
OleRun
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantChangeType
VariantClear
VariantInit
SetErrorInfo
CreateErrorInfo
GetErrorInfo
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ