Static task
static1
Behavioral task
behavioral1
Sample
3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496.exe
Resource
win10v2004-20231020-en
General
-
Target
3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496
-
Size
1.2MB
-
MD5
72a61b8c958d2586e6e05f7f10c35d19
-
SHA1
7fdc5f80aebb3824a1e972dfb6295687c082e359
-
SHA256
3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496
-
SHA512
712c5409cabb62ddc5fa53f396d23b73056d22e61a264831074720711f9e08435ffb21c482010994db6ca3d156750b45a857ad80be0b2a0bccfb5645113b562f
-
SSDEEP
24576:2tCvHw5GID1GswToAyxe2Ukq/u9AAifTrri4wF6:ICNIDg1TVyxe/keua/Trr2F6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496
Files
-
3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496.exe windows:6 windows x86
701f26f20ee872d862989b689bc44eca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CLSIDFromString
IIDFromString
StringFromGUID2
OleRun
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetFolderPathW
wininet
InternetTimeFromSystemTime
InternetTimeToSystemTime
InternetCrackUrlA
HttpQueryInfoA
HttpOpenRequestA
InternetErrorDlg
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
user32
GetDesktopWindow
MessageBoxW
TrackPopupMenu
ShowWindow
DispatchMessageW
SetWindowLongA
CreatePopupMenu
wsprintfA
CharNextA
GetCursorPos
SetForegroundWindow
IsWindowUnicode
PostQuitMessage
PeekMessageA
AppendMenuA
TranslateMessage
CreateWindowExA
DefWindowProcA
RegisterClassA
GetWindowLongA
GetMessageW
GetMessageA
LoadImageA
DispatchMessageA
DestroyWindow
LoadStringA
PostMessageA
GetSystemMetrics
MsgWaitForMultipleObjectsEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
kernel32
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
GetSystemInfo
CompareStringW
EncodePointer
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
GetStringTypeW
VirtualAlloc
VirtualProtect
VirtualQuery
GetFileType
GetConsoleCP
GetConsoleMode
CreateDirectoryW
LCMapStringW
GetDriveTypeW
GetFileInformationByHandle
GetFullPathNameW
SetStdHandle
GetModuleFileNameW
GetStdHandle
GetModuleFileNameA
SizeofResource
LoadLibraryExA
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
FindResourceA
lstrlenA
CreateMutexA
WaitForSingleObject
lstrcmpA
lstrcatA
GetModuleHandleA
GetCommandLineA
MultiByteToWideChar
GetLastError
SetDllDirectoryA
CloseHandle
RaiseException
IsDBCSLeadByte
LoadResource
DecodePointer
DeleteCriticalSection
FreeLibrary
WideCharToMultiByte
lstrcmpiA
SystemTimeToTzSpecificLocalTime
CreateEventA
SetEvent
lstrcpyA
CreateThread
ResetEvent
lstrcpynA
OpenEventA
WriteFile
Sleep
CreateFileA
GetCurrentProcess
GetTempPathA
GetVersionExA
DeleteFileA
LocalFree
ReadFile
FileTimeToSystemTime
SetHandleInformation
TerminateProcess
CreatePipe
PeekNamedPipe
CreateProcessA
GetExitCodeProcess
FindClose
LocalAlloc
GetSystemDirectoryA
LoadLibraryA
LockResource
ExitProcess
FormatMessageA
GetCurrentThreadId
FormatMessageW
GetLocalTime
GetCurrentProcessId
SetEndOfFile
SetFilePointerEx
SetLastError
GetCommandLineW
GetModuleHandleExW
GetNativeSystemInfo
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetFileAttributesA
OpenMutexA
LoadLibraryExW
GetModuleHandleExA
LoadLibraryW
CreateFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
IsDebuggerPresent
OutputDebugStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
GetTimeZoneInformation
GetFileSizeEx
FlushFileBuffers
ReadConsoleW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
GetProcAddress
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyA
CryptAcquireContextA
RegQueryValueExA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegNotifyChangeKeyValue
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
oleaut32
VariantChangeType
SysAllocString
SysStringByteLen
VariantInit
GetErrorInfo
VarUI4FromStr
SysFreeString
VariantClear
shlwapi
ord12
gdi32
GetStockObject
crypt32
CryptProtectData
CryptUnprotectData
CryptStringToBinaryA
CryptBinaryToStringA
msi
ord160
ord31
ord168
ord91
ord137
ord189
ord159
ord115
ord141
ord117
ord44
ord204
ord67
ord8
ord158
Sections
.text Size: 403KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE