Static task
static1
Behavioral task
behavioral1
Sample
3269b9c4a74ecbc61022db3ce7e35be13a3cd5f537ab018a6a5ff97a47f47ed5.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3269b9c4a74ecbc61022db3ce7e35be13a3cd5f537ab018a6a5ff97a47f47ed5.exe
Resource
win10v2004-20231023-en
General
-
Target
3269b9c4a74ecbc61022db3ce7e35be13a3cd5f537ab018a6a5ff97a47f47ed5
-
Size
372KB
-
MD5
95efeb973e94da1292ef09fa0c5e1e14
-
SHA1
134f015b2382729ca5a72e668e06bbb94989a1a8
-
SHA256
3269b9c4a74ecbc61022db3ce7e35be13a3cd5f537ab018a6a5ff97a47f47ed5
-
SHA512
4179657d983054a019b292e2581364b8cb1c45b01abd8b25b4641f6d921b53467f46586728320f489050507e552034b64ad0ed5d4fd5face7540995609eea7f8
-
SSDEEP
6144:52235Sc1kQ4BFWIrjPeE7g9WOCRyTxt5AT9IPEmE16GKkOz:5T3gcqBBrfECwD5AR1w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3269b9c4a74ecbc61022db3ce7e35be13a3cd5f537ab018a6a5ff97a47f47ed5
Files
-
3269b9c4a74ecbc61022db3ce7e35be13a3cd5f537ab018a6a5ff97a47f47ed5.exe windows:4 windows x86
9ffa870f625a5376668068057de219ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord5912
ord6724
ord1551
ord1670
ord1671
ord2020
ord4580
ord4890
ord4735
ord4212
ord5182
ord3641
ord1880
ord1892
ord762
ord266
ord1123
ord1489
ord876
ord2902
ord6118
ord299
ord6703
ord1482
ord304
ord572
ord3171
ord4261
ord2991
ord5214
ord4234
ord1402
ord5915
ord6725
ord1547
ord2089
ord4098
ord1483
ord1931
ord591
ord1794
ord4104
ord2322
ord781
ord3997
ord5529
ord5403
ord2475
ord6180
ord6236
ord2899
ord741
ord657
ord751
ord2882
ord3210
ord1934
ord3287
ord1280
ord3204
ord3230
ord2958
ord4238
ord2092
ord658
ord3879
ord1884
ord4001
ord4123
ord5641
ord5873
ord2131
ord3875
ord4118
ord4115
ord3163
ord3161
ord1279
ord5637
ord2372
ord1903
ord3317
ord4240
ord1591
ord2095
ord709
ord6035
ord2272
ord3401
ord1968
ord5731
ord347
ord3761
ord501
ord2654
ord6067
ord1728
ord3684
ord3683
ord4541
ord757
ord1620
ord3333
ord4481
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord587
ord4109
ord748
ord1054
ord265
ord1084
ord2371
ord4125
ord1063
ord3324
ord2983
ord4243
ord1594
ord1650
ord2098
ord3881
ord4749
ord2164
ord2657
ord6090
ord3934
ord4035
ord3229
ord4237
ord1570
ord2091
ord4099
ord1484
ord1933
ord6266
ord1397
ord3406
ord630
ord3088
ord2021
ord385
ord3164
ord4232
ord1545
ord2086
ord2168
ord3195
ord620
ord3315
ord1589
ord1647
ord739
ord1781
ord1191
ord1187
ord4041
ord562
ord5497
ord4108
ord2271
ord2264
ord5985
ord589
ord602
ord1929
ord330
ord5059
ord5622
ord3348
ord4564
ord4320
ord629
ord2903
ord5089
ord384
ord1873
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4262
ord3182
ord354
ord310
ord784
ord605
ord578
ord566
ord764
msvcr80
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
_onexit
_lock
_XcptFilter
_encode_pointer
_unlock
strncpy
atoi
__CxxFrameHandler3
free
malloc
strftime
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
__dllonexit
sscanf
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
qsort
bsearch
realloc
memcpy
_localtime64_s
memcpy_s
_time64
exit
atof
memset
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
_mbschr
kernel32
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
InterlockedExchange
GetVersion
GetProfileStringA
GlobalFree
InterlockedIncrement
LocalFree
InterlockedDecrement
GetLastError
MultiByteToWideChar
lstrlenA
DeleteFileA
GetModuleFileNameA
MulDiv
IsBadReadPtr
LoadLibraryA
GetProcAddress
GetProcessHeap
FreeLibrary
lstrcpynA
GetCurrentProcess
GlobalLock
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GlobalAlloc
user32
GetDesktopWindow
GetDC
ReleaseDC
SystemParametersInfoA
LoadBitmapA
GetDlgCtrlID
SetWindowLongA
SetClassLongA
GetCursorPos
IsWindow
EnableWindow
SendMessageA
GetWindowRect
PtInRect
CallWindowProcA
SetWindowPos
SetRect
MessageBoxA
OffsetRect
FillRect
GetClientRect
UpdateWindow
InvalidateRect
GetSystemMetrics
LoadIconA
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassExA
DefWindowProcA
DestroyWindow
BeginPaint
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
SetCursor
GetSysColor
GetParent
KillTimer
SetTimer
RedrawWindow
gdi32
CreateDCA
SetWindowOrgEx
CreatePatternBrush
GetViewportOrgEx
SetViewportOrgEx
DeleteObject
GetStockObject
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
CreateFontIndirectA
EndDoc
AbortDoc
StartPage
StartDocA
Rectangle
GetDeviceCaps
CreateFontA
CreatePen
CreateDIBitmap
winspool.drv
DocumentPropertiesA
advapi32
RegQueryValueExA
RegOpenKeyA
shell32
ShellExecuteA
ole32
CLSIDFromString
OleRun
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
SysStringByteLen
SysFreeString
VariantClear
SysAllocString
VariantInit
VariantCopy
VariantChangeType
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayPutElement
SafeArrayCreate
GetErrorInfo
SysAllocStringByteLen
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ