Static task
static1
Behavioral task
behavioral1
Sample
a3d02f1c6536ec0ed5932e7207fba40ed5d4f37d68a72dbec0d752be19bfdb0a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a3d02f1c6536ec0ed5932e7207fba40ed5d4f37d68a72dbec0d752be19bfdb0a.exe
Resource
win10v2004-20231127-en
General
-
Target
a3d02f1c6536ec0ed5932e7207fba40ed5d4f37d68a72dbec0d752be19bfdb0a
-
Size
2.8MB
-
MD5
7d6625ab5fc3fba39ada80c7d2fa916d
-
SHA1
d72d0a2a72b60340d77315457dc152acb4a06b40
-
SHA256
a3d02f1c6536ec0ed5932e7207fba40ed5d4f37d68a72dbec0d752be19bfdb0a
-
SHA512
17a0431c7fb568adab2caee83d5bfde949658b042fb04bd4db025f4cde938bde9cc49c9dca1203ffc969ab6de180154477dd4d50c80f4e1bfc03b27ce3ba096e
-
SSDEEP
49152:LFi+ZTRHPi3IqTCIp8KAO5QNLJyUpTbvcu0jBqJ/wA:LFi+ZTs3IqTCIp8KhQNLVpTbxqBqJoA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3d02f1c6536ec0ed5932e7207fba40ed5d4f37d68a72dbec0d752be19bfdb0a
Files
-
a3d02f1c6536ec0ed5932e7207fba40ed5d4f37d68a72dbec0d752be19bfdb0a.exe windows:6 windows x86 arch:x86
a0d0d22e25973bf03675cd7bd79b7d46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_COLORtoDWORD@16
_VECTOR3Length@4
_Normalize@8
_SetRotationYMatrix@8
_CrossProduct@12
_WriteTGA@24
_RotatePositionWithPivot@24
_CalcDistance@8
_MatrixMultiply2@12
_TransformV3TOV4@16
_SetInverseMatrix@8
_SetRotationXMatrix@8
_TransformVector3_VPTR2@16
wsock32
inet_addr
gethostbyname
WSAStartup
WSACleanup
socket
send
recv
ioctlsocket
htons
connect
closesocket
dinput8
DirectInput8Create
kernel32
GetOEMCP
GetACP
IsValidCodePage
DecodePointer
LCMapStringEx
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
ReadFile
GetLastError
TerminateProcess
CreateThread
OpenProcess
lstrcmpiA
lstrcatA
GetLogicalDriveStringsA
QueryDosDeviceA
GetModuleHandleA
MulDiv
WriteFile
FindClose
FindFirstFileA
FindNextFileA
RemoveDirectoryA
WaitForSingleObject
GetCurrentProcessId
GetStringTypeW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentProcess
GetCommandLineW
GetCurrentThreadId
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
CopyFileA
GetVersionExA
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
OutputDebugStringW
CreateDirectoryW
GetFileAttributesExW
FlushFileBuffers
GetFileSizeEx
GetConsoleOutputCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
WriteConsoleW
GetFileType
GetStdHandle
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
LoadLibraryExW
GetModuleFileNameW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
CreateFileW
HeapSize
SetEndOfFile
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
LocalFree
InitializeCriticalSectionEx
RtlUnwind
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
RaiseException
GetCommandLineA
GetCurrentThread
EncodePointer
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
InitializeSListHead
user32
GetClipboardData
wsprintfA
SetRect
MessageBoxA
CharNextA
CharPrevA
OpenClipboard
GetClientRect
LoadCursorFromFileA
SetCursor
LoadIconA
ShowCursor
UpdateWindow
GetSystemMetrics
CreateWindowExA
RegisterClassExA
DefWindowProcA
RegisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
ReleaseDC
GetDC
ScreenToClient
GetCursorPos
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
ShowWindow
OffsetRect
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
gdi32
GetStockObject
GetDeviceCaps
SelectObject
GetTextExtentPoint32A
DeleteObject
CreateFontIndirectA
advapi32
OpenProcessToken
OpenThreadToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
oleaut32
VariantClear
freeimage
_FreeImage_Unload@4
_FreeImage_GetInfo@4
_FreeImage_GetBits@4
_FreeImage_Load@12
_FreeImage_ConvertTo16Bits565@4
_FreeImage_SaveJPEG@12
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 657KB - Virtual size: 942KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ