Static task
static1
Behavioral task
behavioral1
Sample
3d2a77d0e346d8348ad06aaea24a4b7832845dc2f198e8a1ba9f500ea6dd7029.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
3d2a77d0e346d8348ad06aaea24a4b7832845dc2f198e8a1ba9f500ea6dd7029.exe
Resource
win10v2004-20231127-en
General
-
Target
3d2a77d0e346d8348ad06aaea24a4b7832845dc2f198e8a1ba9f500ea6dd7029
-
Size
628KB
-
MD5
31517fee49840e349520b5681a94c01a
-
SHA1
e2e9646a90c47e59ec3ede670156ddac13b7b398
-
SHA256
3d2a77d0e346d8348ad06aaea24a4b7832845dc2f198e8a1ba9f500ea6dd7029
-
SHA512
b975e5cd3a8d8dbb02559b9feeffce4a0439541b6e305ebf0607fb331c6bfeca9548363d3d07aee620fc3db016ebd97c25797aaba83dc00fd8c89cb80d23d2ad
-
SSDEEP
12288:lGtlqggP0+aJJDt9G0C971pU+RNTDzyf2vVBxXTCKqo39:lGtlqggM+a9CZ1O+RN7yf2vrhTCKj39
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d2a77d0e346d8348ad06aaea24a4b7832845dc2f198e8a1ba9f500ea6dd7029
Files
-
3d2a77d0e346d8348ad06aaea24a4b7832845dc2f198e8a1ba9f500ea6dd7029.exe windows:6 windows x64 arch:x64
d6bc7d433b039a120ad9437f944569a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetFullPathNameW
RemoveDirectoryW
GetModuleFileNameW
GetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
CreateProcessW
FreeLibrary
CopyFileW
SetDllDirectoryW
MoveFileW
GetCommandLineW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetTempPathW
Sleep
GetLastError
GetVersionExA
DeleteCriticalSection
GetModuleHandleW
GetEnvironmentStringsW
GetStdHandle
WriteConsoleA
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
GetTickCount
MultiByteToWideChar
MoveFileExW
WideCharToMultiByte
SetThreadLocale
FindFirstFileExW
SetLastError
GetCurrentProcess
K32GetModuleFileNameExW
GetSystemDirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
GetUserDefaultLCID
Process32FirstW
LoadLibraryW
GetCurrentProcessId
GetFileSizeEx
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
CreateDirectoryW
GetFileTime
ExitProcess
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
GetStringTypeW
CompareStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
HeapFree
HeapAlloc
HeapReAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
ReadConsoleW
SetEndOfFile
GetEnvironmentVariableW
GetSystemTimeAsFileTime
GetFileSize
GetLocalTime
CloseHandle
CreateFileW
WaitForSingleObject
FindClose
WriteFile
FindNextFileW
FindFirstFileW
MapViewOfFile
ReadFile
Sections
.text Size: 396KB - Virtual size: 395KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ