Static task
static1
Behavioral task
behavioral1
Sample
3b52a760d293c508e145ca07daedfb60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b52a760d293c508e145ca07daedfb60.exe
Resource
win10v2004-20231215-en
General
-
Target
3b52a760d293c508e145ca07daedfb60
-
Size
227KB
-
MD5
3b52a760d293c508e145ca07daedfb60
-
SHA1
1cd910e42c93e63262e01df3f1c083a6354cc89b
-
SHA256
6f9deabf5d6914b749f7f6b06d89431cd2bdc937a25c14989811a4be2a0bf199
-
SHA512
2af727e8284aebb0a56f18305ee757a6d261499a547a59addc98c06fb0e5f6a240de6abcf74b1350aabf2cd58d57467d5eb414d0e05ddbe0739c9c68a9581590
-
SSDEEP
6144:Xrx9HGCenzAjjHlEJyWYg1vvIAJVRqR70v6860Y:X7HgIuYg1rvRF6X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b52a760d293c508e145ca07daedfb60
Files
-
3b52a760d293c508e145ca07daedfb60.exe windows:4 windows x86 arch:x86
301acaa9297e042e49f1583df2aac621
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatA
GetUserDefaultLangID
CreateSemaphoreA
OpenMutexW
CreateThread
GetShortPathNameA
MoveFileA
CreatePipe
GetEnvironmentVariableW
GetAtomNameA
CreateMailslotW
BeginUpdateResourceW
CreateNamedPipeA
CompareFileTime
GetSystemTime
GetEnvironmentStringsW
RemoveDirectoryW
GetCalendarInfoW
WinExec
DisconnectNamedPipe
GetNumberFormatW
SetEvent
GetAtomNameW
GetLogicalDrives
GetCPInfo
CreateEventA
LoadLibraryA
GetSystemInfo
GetTempPathW
IsValidCodePage
SetPriorityClass
EnumDateFormatsA
FindResourceW
OpenSemaphoreW
EndUpdateResourceA
lstrcpy
GetTimeFormatW
ReadDirectoryChangesW
SetErrorMode
GlobalGetAtomNameW
OpenEventA
CreateDirectoryW
lstrcmpi
GetVersionExA
GetCommandLineA
RaiseException
GetProcAddress
GetFileTime
SearchPathA
SetCalendarInfoW
OpenProcess
GetOEMCP
EndUpdateResourceW
user32
DestroyIcon
GetSysColorBrush
EnumClipboardFormats
SetWindowTextW
LoadCursorA
SetTimer
DestroyWindow
PostQuitMessage
EmptyClipboard
SetWindowRgn
GetClassInfoW
GetClassNameW
ReleaseDC
WaitForInputIdle
LoadBitmapW
LoadIconW
CreateAcceleratorTableA
CreateDialogIndirectParamW
MessageBoxIndirectA
DialogBoxIndirectParamA
GetIconInfo
GetDC
CreateWindowExW
MonitorFromRect
CreateCaret
IsMenu
gdi32
PaintRgn
SetPixel
DeleteDC
GetMetaFileA
SetDIBColorTable
SetDeviceGammaRamp
SetViewportOrgEx
GetCharWidth32W
SetTextAlign
UnrealizeObject
CreateICW
PolyDraw
CreateFontA
LPtoDP
RemoveFontResourceExW
SetColorAdjustment
advapi32
RegSaveKeyA
RegOpenKeyW
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegDeleteValueW
RegQueryValueA
shell32
SHGetFileInfoA
SHGetDataFromIDListA
shlwapi
StrRStrIA
PathSearchAndQualifyW
PathIsNetworkPathW
PathBuildRootW
StrStrIW
UrlUnescapeA
IntlStrEqWorkerW
StrToIntA
SHRegSetUSValueA
PathIsURLA
StrChrA
PathMakeSystemFolderA
PathGetCharTypeA
UrlGetLocationA
PathStripPathW
SHDeleteKeyA
SHDeleteKeyW
opengl32
glMap1d
glViewport
wglSwapMultipleBuffers
glAlphaFunc
glVertex3dv
GlmfEndPlayback
glFinish
urlmon
GetMarkOfTheWeb
SetSoftwareUpdateAdvertisementState
AsyncInstallDistributionUnit
CreateAsyncBindCtxEx
RegisterMediaTypeClass
FindMimeFromData
CoGetClassObjectFromURL
sqlunirl
_ChooseFont_@4
_NDdeTrustedShareEnum_@24
_CreateEvent_@16
_MapVirtualKey_@8
ConvertMultiSZNameToW
_CreateAcceleratorTable_@8
_FindResourceEx_@16
_ObjectOpenAuditAlarm_@48
_GetUserObjectInformation_@20
_DrawState_@40
_GlobalAddAtom_@4
_SendMessage@16
_CharPrev_@8
_GetWindowsDirectory_@8
newWideCharFromMultiByte
_CreateMailslot_@16
_CopyAcceleratorTable_@12
_GetSaveFileName@4
_LookupPrivilegeDisplayName_@20
_GetPrivateProfileSectionNames_@12
_IsDialogMessage@8
_GetBinaryType_@8
_CreateDesktop_@24
crypt32
CertSerializeCertificateStoreElement
CryptMsgGetAndVerifySigner
RegOpenHKCUKeyExU
CryptVerifyMessageHash
CryptVerifySignatureU
CertVerifyCRLRevocation
CertUnregisterPhysicalStore
CertGetIntendedKeyUsage
CryptSignAndEncodeCertificate
I_CertUpdateStore
Sections
.MMzeu Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YlZ Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ao Size: 4KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ls Size: 5KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zvNLW Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.F Size: 4KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.soXfM Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PGXCF Size: 5KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XWMJVR Size: 5KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ