Static task
static1
Behavioral task
behavioral1
Sample
c3f7abf040275768acc81089b68c3e1e3d74e5958d8b74433fb59f8356fb1b34.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c3f7abf040275768acc81089b68c3e1e3d74e5958d8b74433fb59f8356fb1b34.exe
Resource
win10v2004-20230915-en
General
-
Target
c3f7abf040275768acc81089b68c3e1e3d74e5958d8b74433fb59f8356fb1b34
-
Size
675KB
-
MD5
90d1387b66d1c4d696958e6037af529a
-
SHA1
f3dc82ee35eb2077195436f0bf90594d2e2c8ab5
-
SHA256
c3f7abf040275768acc81089b68c3e1e3d74e5958d8b74433fb59f8356fb1b34
-
SHA512
23594ca2367033b3be9cff3dc966e988adaacda4a43922ad22110d9dfbbeddda17e6d9c5276a37601e63b43d3ba9eaca6f45ad37d6ba0c9ed555a0f10cda8741
-
SSDEEP
6144:OfsSZ3Hgsv4vcgcQUiZ+Mibq3Al0n7NUiqv1dXqowvwrYKMfcw/Fzzn:OfsStAU4VcQ/ZfiOIW7NUevWrM9n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3f7abf040275768acc81089b68c3e1e3d74e5958d8b74433fb59f8356fb1b34
Files
-
c3f7abf040275768acc81089b68c3e1e3d74e5958d8b74433fb59f8356fb1b34.exe windows:5 windows x86
cb65cd8fc268d15a52de6ec11f1b3a20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ExtTextOutW
GetDIBits
GetObjectW
GetRgnBox
GetStockObject
GetTextExtentExPointW
GetTextMetricsW
LineTo
MoveToEx
Rectangle
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetTextAlign
SetTextColor
CreateRectRgn
CreateFontIndirectW
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
CombineRgn
GetDeviceCaps
DeleteObject
ExtCreatePen
DeleteDC
user32
LoadStringW
LoadIconW
GetWindowLongW
GetSystemMetrics
GetParent
GetDlgItemTextW
GetDlgItem
EndDialog
EnableWindow
DialogBoxParamW
CheckDlgButton
SendMessageW
SetDlgItemTextW
SetWindowLongW
GetDC
GetMessageW
GetWindowRect
IsDlgButtonChecked
KillTimer
PostThreadMessageW
RegisterHotKey
ReleaseDC
SendDlgItemMessageW
SetTimer
SetWindowPos
SetWindowTextW
ShowWindow
SystemParametersInfoW
UnregisterHotKey
BeginPaint
MessageBoxW
ClientToScreen
CreateWindowExW
DefWindowProcW
DestroyWindow
DrawFrameControl
DrawTextW
EndPaint
GetAsyncKeyState
GetClientRect
GetCursorPos
GetFocus
GetKeyState
GetScrollInfo
GetSysColor
GetSysColorBrush
GetWindow
GetWindowTextW
InvalidateRect
IsWindowEnabled
LoadCursorW
MoveWindow
RedrawWindow
RegisterClassExW
ScreenToClient
SetFocus
SetScrollInfo
SetScrollPos
TranslateMessage
UnregisterClassW
WindowFromPoint
CallWindowProcW
PostMessageW
GetDesktopWindow
comctl32
ImageList_GetImageInfo
ImageList_AddMasked
ImageList_Draw
InitCommonControlsEx
PropertySheetW
CreatePropertySheetPageW
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Create
shlwapi
StrFormatByteSizeW
setupapi
SetupCloseFileQueue
SetupOpenFileQueue
SetupQueueCopyW
SetupQueueDeleteW
SetupQueueRenameW
pSetupGetField
SetupGetStringFieldW
SetupGetMultiSzFieldW
SetupGetIntField
SetupGetBinaryField
SetupGetFieldCount
SetupFindNextLine
SetupFindFirstLineW
SetupCloseInfFile
SetupOpenInfFileW
SetupCommitFileQueueW
msvcrt
__winitenv
_initterm
_fpreset
_cexit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__setusermatherr
_wcmdln
__lconv_init
malloc
signal
strncpy
isspace
sprintf
iswctype
wcsstr
towupper
wcstoul
memcmp
memcpy
wcsncpy
wcsncmp
wcscmp
abs
memmove
_wcsnicmp
_wcsicmp
wcsrchr
wcscpy
wcschr
swscanf
_vsnwprintf
wcslen
memset
strlen
_vsnprintf
wcstol
kernel32
GetCurrentProcessId
Sleep
SetUnhandledExceptionFilter
GetStartupInfoW
ReleaseSemaphore
OutputDebugStringW
LoadLibraryW
GetSystemTimeAsFileTime
GetProcAddress
CreateSemaphoreW
WaitForSingleObject
SetEvent
QueryPerformanceCounter
ResetEvent
QueryDosDeviceW
HeapFree
HeapAlloc
GlobalDeleteAtom
GlobalAddAtomW
GetThreadId
GetProcessHeap
GetLogicalDriveStringsW
CreateThread
CreateProcessW
CreateEventW
GetLastError
DeviceIoControl
CreateFileW
CloseHandle
SetThreadLocale
GetThreadLocale
GetModuleHandleA
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
TlsGetValue
GetCurrentThreadId
GetTickCount
ResumeThread
ntdll
_allmul
RtlAssert
NtClose
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
NtOpenKey
NtQuerySystemInformation
NtDeviceIoControlFile
NtFsControlFile
NtOpenFile
NtQueryVolumeInformationFile
NtReadFile
NtQuerySystemTime
RtlAllocateHeap
RtlFreeHeap
RtlReAllocateHeap
RtlFreeUnicodeString
RtlInitUnicodeString
NtOpenDirectoryObject
LdrFindResource_U
LdrAccessResource
NtUnmapViewOfSection
NtMapViewOfSection
NtCreateSection
NtSetInformationFile
NtCreateFile
DbgPrint
NtQueryKey
NtEnumerateKey
RtlImageNtHeader
RtlEqualUnicodeString
RtlCopyUnicodeString
NtQueryValueKey
RtlCompareMemory
RtlCreateUnicodeString
NtWriteFile
NtQueryInformationFile
_allrem
RtlTimeToTimeFields
RtlQueryRegistryValues
RtlUnicodeStringToInteger
Sections
.text Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 401KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ