Static task
static1
Behavioral task
behavioral1
Sample
3c0ef77c09a0d7549096cc5144b12cb6f40ff28f00362db79beb127489ed616e.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3c0ef77c09a0d7549096cc5144b12cb6f40ff28f00362db79beb127489ed616e.exe
Resource
win10v2004-20231023-en
General
-
Target
3c0ef77c09a0d7549096cc5144b12cb6f40ff28f00362db79beb127489ed616e
-
Size
4.3MB
-
MD5
becc1e39d2be0a296f80d373aa288fc7
-
SHA1
571eb59bda96c6ba6cbbeab68088586b6b22ab9b
-
SHA256
3c0ef77c09a0d7549096cc5144b12cb6f40ff28f00362db79beb127489ed616e
-
SHA512
1816cce28f4cd7c572f8626f4c7def598ce18b93c04bcb6568d3f31a013f2cb680478af3a63687700b7641c75ab47aa6aea5cce72dd030c84711b44ba447fc77
-
SSDEEP
98304:IjEgwQSAgVyglsVUafhsifd6VYQ1LUQ7IHeqfDSaJUw1ShI9IImStU0SFM5D/7LH:IjEgwQSAgVyglsVUafhsifd6VYQ1LUQS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c0ef77c09a0d7549096cc5144b12cb6f40ff28f00362db79beb127489ed616e
Files
-
3c0ef77c09a0d7549096cc5144b12cb6f40ff28f00362db79beb127489ed616e.exe windows:4 windows x86
13fb68fddf469f8d9e1a589db046806a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
RasGetConnectStatusA
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
AVIStreamGetFrame
winmm
midiStreamRestart
waveOutRestart
PlaySoundA
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
midiStreamClose
midiOutReset
midiStreamStop
waveOutPause
waveOutReset
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
ws2_32
gethostname
inet_addr
inet_ntoa
gethostbyname
WSACleanup
select
send
closesocket
WSAAsyncSelect
recvfrom
ioctlsocket
recv
getpeername
accept
ntohl
WSAStartup
kernel32
TerminateProcess
OpenProcess
GetVersion
CreateMutexA
ReleaseMutex
SuspendThread
InterlockedIncrement
InterlockedDecrement
LocalFree
FormatMessageA
FileTimeToLocalFileTime
lstrcpynA
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
lstrcmpiA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetFileSize
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
GetProfileIntA
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
HeapSize
GetACP
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateThread
GetCurrentProcess
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
GetTimeZoneInformation
FileTimeToSystemTime
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
WaitForMultipleObjects
InterlockedExchange
CloseHandle
CreateFileA
DeviceIoControl
SetEvent
FindResourceA
LoadResource
LockResource
ReadFile
lstrlenW
RemoveDirectoryA
WaitForSingleObject
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetUserDefaultLCID
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameA
FreeLibrary
LoadLibraryA
GetLastError
GetVersionExA
GetPrivateProfileSectionNamesA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateThread
CreateEventA
Sleep
ExpandEnvironmentStringsA
GlobalAlloc
GlobalLock
GlobalUnlock
GetTempPathA
FindFirstFileA
FindClose
SetFileAttributesA
GetFileAttributesA
MoveFileA
DeleteFileA
CopyFileA
CreateDirectoryA
SetCurrentDirectoryA
GetVolumeInformationA
GetModuleHandleA
GetProcAddress
MulDiv
GetCommandLineA
GetTickCount
CreateProcessA
lstrcmpA
user32
GetMenuCheckMarkDimensions
wvsprintfA
LoadStringA
GetSysColorBrush
ShowScrollBar
GetScrollPos
RegisterClassA
CreateWindowExA
GetClassLongA
RemovePropA
GetMessageTime
GetLastActivePopup
RegisterWindowMessageA
GetWindowPlacement
EndDialog
CreateDialogIndirectParamA
DestroyWindow
EndPaint
BeginPaint
CharUpperA
GetWindowTextLengthA
GetDoubleClickTime
ClipCursor
GetDlgItem
FindWindowA
GetWindowThreadProcessId
GetClassNameA
GetDesktopWindow
GetWindowTextA
GetMenuItemCount
GetMenuItemID
GetMenuStringA
GetMenuState
GetTabbedTextExtentA
GrayStringA
TabbedTextOutA
WindowFromDC
EnumChildWindows
GetWindowDC
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
GetPropA
MoveWindow
CallWindowProcA
SetPropA
DrawTextA
GetCursor
DrawStateA
FrameRect
GetNextDlgTabItem
GetForegroundWindow
SetWindowTextA
LoadIconA
TranslateMessage
DrawFrameControl
DrawEdge
DrawFocusRect
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
SetMenuItemBitmaps
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
SystemParametersInfoA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetClassInfoA
DefWindowProcA
GetSystemMenu
DeleteMenu
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
InvertRect
IsRectEmpty
ReleaseDC
IsChild
TrackPopupMenu
DestroyMenu
SetForegroundWindow
CheckMenuItem
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBeep
MessageBoxA
GetCursorPos
GetSystemMetrics
IsClipboardFormatAvailable
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WaitForInputIdle
ScrollWindow
GetScrollInfo
CreateAcceleratorTableA
SetScrollInfo
IntersectRect
UnregisterClassA
gdi32
CreatePen
SelectObject
CreatePatternBrush
CreateBitmap
CreateBrushIndirect
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
SelectClipRgn
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
SetPixel
StartPage
CreateRectRgnIndirect
SetBkColor
TextOutA
SetBkMode
SetTextColor
SetDIBitsToDevice
CreateFontA
PatBlt
CombineRgn
SaveDC
RestoreDC
CreatePenIndirect
PtVisible
RectVisible
ExtTextOutA
Escape
GetTextMetricsA
AbortDoc
SetBrushOrgEx
SetPolyFillMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExcludeClipRect
MoveToEx
LineTo
ExtSelectClipRgn
GetViewportExtEx
CopyMetaFileA
BitBlt
GetPixel
CreateCompatibleDC
SetPixelV
Ellipse
CreateRectRgn
Rectangle
FillRgn
CreateSolidBrush
SetWindowOrgEx
LPtoDP
CreateFontIndirectA
GetStockObject
GetObjectA
EndPage
EndDoc
DeleteDC
DPtoLP
StartDocA
GetCurrentObject
RoundRect
GetTextExtentPoint32A
CreateDIBSection
GetDeviceCaps
msimg32
GradientFill
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comdlg32
PrintDlgA
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
advapi32
RegQueryValueA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderPathA
ole32
CoLockObjectExternal
DoDragDrop
OleGetClipboard
OleIsCurrentClipboard
OleFlushClipboard
OleSetClipboard
CoTaskMemFree
RevokeDragDrop
CLSIDFromProgID
OleInitialize
OleUninitialize
CLSIDFromString
CreateStreamOnHGlobal
CoCreateInstance
OleRun
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
oleaut32
LoadTypeLi
UnRegisterTypeLi
VarDateFromStr
LHashValOfNameSys
RegisterTypeLi
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayCreate
SafeArrayDestroy
SysAllocString
VariantInit
VariantCopyInd
VariantChangeType
VariantClear
VariantCopy
SafeArrayGetElement
SafeArrayAccessData
SafeArrayUnaccessData
comctl32
ImageList_Create
ImageList_Destroy
ord17
ImageList_AddMasked
ImageList_Draw
_TrackMouseEvent
ImageList_SetBkColor
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_GetIcon
ImageList_Duplicate
ImageList_DrawIndirect
ImageList_Read
wininet
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetConnectA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 623KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ