Static task
static1
Behavioral task
behavioral1
Sample
3ae4b0a17ea4b6d0a56b36fa148f5195.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ae4b0a17ea4b6d0a56b36fa148f5195.exe
Resource
win10v2004-20231222-en
General
-
Target
3ae4b0a17ea4b6d0a56b36fa148f5195
-
Size
2.1MB
-
MD5
3ae4b0a17ea4b6d0a56b36fa148f5195
-
SHA1
901418de9e339cf2a0e55b57772581d834c8bb31
-
SHA256
63e1b0d4c5a7e92d33fa21b9210b3375cd00a7e4c510eaba41fef205d736c3f1
-
SHA512
ad677b54ba882f990575342a9e69b7fc9bcce76537454cffc489a4ca746e1d556d3b0a2e3ec7f200e1c9bc4b6622591210ef550cb5cc0a5fa03b7853c633e5d4
-
SSDEEP
49152:66QBvw/ZBHoWc9WGsZ8qJTf9f3+05SLeam9Q0cgQRZX33pfPFmcoc6JTAp67:67u/voWc9WVTv57asQ0Jct3pftmU6tQE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ae4b0a17ea4b6d0a56b36fa148f5195
Files
-
3ae4b0a17ea4b6d0a56b36fa148f5195.exe windows:5 windows x86 arch:x86
dad1fb30b7c32e682d716e1edf7fcdad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetLastError
GetDriveTypeW
CompareStringW
lstrcmpiW
lstrlenW
GlobalUnlock
GlobalLock
GlobalAlloc
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
FreeLibrary
GetACP
HeapCreate
ExitProcess
LCMapStringW
lstrcmpW
GetCPInfo
GetStringTypeW
RtlUnwind
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetSystemTimeAsFileTime
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
GetLocaleInfoA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
PeekNamedPipe
OpenEventW
TerminateProcess
OpenProcess
SearchPathW
ConnectNamedPipe
CreateNamedPipeW
GetDiskFreeSpaceExW
ResetEvent
MoveFileW
TerminateThread
GetEnvironmentVariableW
GetSystemDirectoryW
lstrcpynW
GetLocalTime
OutputDebugStringW
GlobalMemoryStatus
GetVersion
GetWindowsDirectoryW
CreateFileW
WriteFile
CreateMutexW
GetFileSize
ReadFile
GlobalFree
GetTempPathW
GetTempPathA
GetTempFileNameW
DeleteFileW
GetTempFileNameA
DeleteFileA
FindFirstFileW
RemoveDirectoryW
FindNextFileW
GetLogicalDriveStringsW
GetSystemInfo
InterlockedExchange
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
MultiByteToWideChar
FindClose
SetFileAttributesW
CreateFileA
LCMapStringA
GetFileAttributesW
GetProcAddress
LoadLibraryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateDirectoryW
GetCurrentProcessId
CloseHandle
GetExitCodeThread
SetEvent
GetSystemTime
GetUserDefaultLangID
GetSystemDefaultLangID
GetLocaleInfoW
EnumResourceLanguagesW
CopyFileW
SetCurrentDirectoryW
GetCommandLineW
UnlockFile
WaitForSingleObject
LockFile
SetFilePointer
GetExitCodeProcess
CreateProcessA
CreateProcessW
GetStdHandle
DuplicateHandle
FlushFileBuffers
GetCurrentThread
GetModuleFileNameA
FormatMessageW
CreateEventW
SetLastError
FlushInstructionCache
GetCurrentProcess
Sleep
RaiseException
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
GetOEMCP
LocalAlloc
LocalFree
LoadLibraryA
GetVersionExW
SetUnhandledExceptionFilter
CreateThread
GetShortPathNameW
MulDiv
user32
GetSysColorBrush
IsWindowVisible
MapWindowPoints
SendMessageW
PtInRect
IsRectEmpty
SetRectEmpty
OffsetRect
ClientToScreen
SetWindowPos
GetSystemMetrics
GetWindowTextW
GetWindowTextLengthW
DrawIconEx
DrawTextW
DefWindowProcW
GetWindowRect
ReleaseDC
GetDC
EqualRect
IntersectRect
GetClientRect
GetWindowLongW
GetComboBoxInfo
DrawFrameControl
RegisterWindowMessageW
CreateAcceleratorTableW
InvalidateRgn
GetDesktopWindow
DestroyAcceleratorTable
GetKeyState
DrawStateW
DrawTextExW
ValidateRect
DestroyMenu
AppendMenuW
CreatePopupMenu
TrackPopupMenu
InflateRect
LoadBitmapW
CharNextW
DrawFocusRect
GetClassNameW
ReleaseCapture
GetCapture
SetCapture
UpdateWindow
DestroyIcon
GetDlgCtrlID
SetScrollInfo
GetScrollPos
GetClassInfoExW
RegisterClassExW
SetScrollPos
EndPaint
FillRect
SetRect
BeginPaint
MoveWindow
GetScrollInfo
ScreenToClient
GetMessagePos
GetSysColor
SystemParametersInfoW
GetActiveWindow
TrackMouseEvent
GetAsyncKeyState
GetWindowDC
KillTimer
CreateWindowExW
DestroyCursor
GetWindowRgn
CopyRect
IsZoomed
SetWindowRgn
CreateDialogParamW
EndDialog
DialogBoxParamW
InvalidateRect
GetNextDlgTabItem
SetFocus
SetCursor
GetWindow
MonitorFromWindow
GetMonitorInfoW
LoadImageW
IsDialogMessageW
IsChild
GetFocus
PostQuitMessage
LoadStringW
MessageBoxW
PostMessageW
SetForegroundWindow
SetCursorPos
GetCursorPos
PeekMessageW
GetForegroundWindow
LoadIconW
DialogBoxIndirectParamW
GetPropW
GetSystemMenu
EnableMenuItem
MsgWaitForMultipleObjects
ModifyMenuW
FindWindowW
MessageBeep
ExitWindowsEx
GetScrollRange
SetPropW
RemovePropW
LoadMenuW
GetSubMenu
SetTimer
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
FrameRect
UnregisterClassA
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
GetParent
CallWindowProcW
SetWindowLongW
GetDlgItem
RedrawWindow
IsWindowEnabled
ShowWindow
EnableWindow
SetWindowTextW
DestroyWindow
IsWindow
gdi32
GetTextMetricsW
ExtTextOutW
SetBkColor
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetMapMode
CreateDIBSection
GetBrushOrgEx
CreateFontIndirectW
GetObjectW
CreateSolidBrush
GetRgnBox
EqualRgn
CreatePolygonRgn
CreateRectRgnIndirect
GetBitmapBits
CreateFontW
ExcludeClipRect
SelectClipRgn
CreateRectRgn
SetBkMode
SetTextColor
SetViewportOrgEx
GetDeviceCaps
SetBrushOrgEx
CreatePatternBrush
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
CreateBitmapIndirect
GetStockObject
advapi32
UnlockServiceDatabase
LookupPrivilegeValueW
OpenProcessToken
StartServiceW
QueryServiceStatus
OpenServiceW
RegDeleteValueA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyA
OpenSCManagerW
LockServiceDatabase
AdjustTokenPrivileges
CloseServiceHandle
RegOpenKeyExA
RegEnumValueA
RegOpenKeyW
GetUserNameW
shell32
ShellExecuteW
ShellExecuteExW
SHGetFileInfoW
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemRealloc
CoTaskMemFree
OleUninitialize
CoInitializeEx
CoUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
CoInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
oleaut32
VarUI4FromStr
VarDateFromStr
OleLoadPicture
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
SysStringLen
OleCreateFontIndirect
VariantCopy
VariantInit
VariantClear
SysAllocString
SysFreeString
dbghelp
SymCleanup
SymFromAddr
SymFunctionTableAccess
SymGetModuleBase
StackWalk
SymInitialize
SymSetOptions
SymGetLineFromAddr
SymSetSearchPath
netapi32
NetUserGetLocalGroups
shlwapi
PathIsUNCW
PathIsDirectoryW
PathFileExistsW
comctl32
ImageList_LoadImageW
ImageList_SetBkColor
ImageList_GetIcon
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
_TrackMouseEvent
PropertySheetW
CreatePropertySheetPageW
DestroyPropertySheetPage
InitCommonControlsEx
msimg32
AlphaBlend
TransparentBlt
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
Sections
.text Size: 799KB - Virtual size: 798KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ