Static task
static1
Behavioral task
behavioral1
Sample
3c173ef4ecb767d7153cb0a6b9a1087e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c173ef4ecb767d7153cb0a6b9a1087e.exe
Resource
win10v2004-20231215-en
General
-
Target
3c173ef4ecb767d7153cb0a6b9a1087e
-
Size
2.5MB
-
MD5
3c173ef4ecb767d7153cb0a6b9a1087e
-
SHA1
b0c3393d443e77fe9623a677ed031e369760cd01
-
SHA256
e1b9ea4f2464d4f06d093f40aa2e2b3f92b399106f11d5200312de5b4498b17e
-
SHA512
beb71cad3c721ba2447555a7bf781572a201d15d65a6e7f22c461faca134cadd939a2f4128063983da754e9f3461fe04bd4cf08edb685f9340e9bc2d10eac8d4
-
SSDEEP
49152:sgDF66GL1GxxnoNQoi6pU76YEATwuju8SsSzAcZ5n:sS66Bci76pUGnY3cZ5n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c173ef4ecb767d7153cb0a6b9a1087e
Files
-
3c173ef4ecb767d7153cb0a6b9a1087e.exe windows:4 windows x86 arch:x86
bba9493537edb9f5a2fe6cc0a42d8408
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
GetVersion
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
GetProcAddress
GetLocaleInfoA
GetLastError
FindFirstFileA
ExitProcess
CreateThread
UnhandledExceptionFilter
SetFilePointer
RtlUnwind
ReadFile
RaiseException
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
lstrcpyA
lstrcmpA
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
Sleep
SizeofResource
SetLastError
SetFilePointer
SetEvent
SetErrorMode
ResetEvent
ReadFile
MultiByteToWideChar
MulDiv
LockResource
LocalFree
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GlobalAddAtomA
GetVersionExA
GetVersion
GetTickCount
GetSystemInfo
GetProcAddress
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileAttributesA
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FindResourceA
FindNextFileA
FindFirstFileA
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateFileA
CompareStringA
CloseHandle
Sleep
CreateDirectoryA
CreateEventA
CreateMutexA
CreateProcessA
DeleteFileA
DuplicateHandle
EnumCalendarInfoA
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetExitCodeThread
GetFileSize
GetFileType
GetFullPathNameA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProfileStringA
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTimeZoneInformation
GetVolumeInformationA
GetWindowsDirectoryA
GlobalDeleteAtom
GlobalFindAtomA
LoadLibraryExA
LocalFileTimeToFileTime
MoveFileA
OpenProcess
QueryPerformanceCounter
ReleaseMutex
ResumeThread
SearchPathA
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFileTime
SetProcessShutdownParameters
SetThreadLocale
SetThreadPriority
SuspendThread
SystemTimeToFileTime
WaitForSingleObject
WinExec
WriteFile
WritePrivateProfileStringA
_hread
_hwrite
_lclose
_lcreat
_llseek
_lopen
lstrlen
user32
GetKeyboardType
LoadStringA
CharNextA
CreateWindowExA
mouse_event
keybd_event
WindowFromPoint
WaitMessage
ValidateRect
UpdateWindow
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetThreadDesktop
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetProcessWindowStation
SetParent
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetClipboardData
SetClassLongA
SetCapture
SetActiveWindow
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RedrawWindow
PtInRect
PostThreadMessageA
PostQuitMessage
PostMessageA
PeekMessageA
OpenWindowStationA
OpenInputDesktop
OpenDesktopA
OpenClipboard
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBeep
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadKeyboardLayoutA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsRectEmpty
IsIconic
IsDialogMessageA
IsClipboardFormatAvailable
IsChild
IsCharUpperA
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetUserObjectInformationA
GetUpdateRect
GetTopWindow
GetThreadDesktop
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetProcessWindowStation
GetParent
GetWindow
GetMessagePos
GetMessageA
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursorInfo
GetCursor
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EnumWindowStationsA
EnumThreadWindows
EnumClipboardFormats
EndPaint
EndDeferWindowPos
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextExA
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyCursor
DeleteMenu
DeferWindowPos
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreatePopupMenu
CreateMenu
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
BeginDeferWindowPos
CharNextA
CharLowerBuffA
CharLowerA
CharUpperBuffA
CharToOemA
AdjustWindowRectEx
ActivateKeyboardLayout
CloseClipboard
CloseDesktop
CloseWindowStation
CreateIcon
LoadIconA
MessageBoxA
RegisterClassA
UnregisterClassA
WinHelpA
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
GetActiveObject
SysFreeString
GetErrorInfo
advapi32
RegEnumKeyExA
LogonUserA
StartServiceA
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CopySid
CreateProcessAsUserA
CreateServiceA
DeleteService
DeregisterEventSource
DuplicateTokenEx
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegFlushKey
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegisterEventSourceA
RegisterServiceCtrlHandlerA
ReportEventA
SetServiceStatus
StartServiceCtrlDispatcherA
mpr
WNetOpenEnumA
WNetGetUniversalNameA
WNetGetConnectionA
WNetEnumResourceA
WNetCloseEnum
WNetCancelConnection2A
WNetAddConnection2A
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
gdi32
UnrealizeObject
StretchDIBits
StretchBlt
StartPage
StartDocA
SetWindowOrgEx
SetWinMetaFileBits
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetMapMode
SetEnhMetaFileBits
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SetAbortProc
SelectPalette
SelectObject
SelectClipRgn
SaveDC
RoundRect
RestoreDC
Rectangle
RectVisible
RealizePalette
Polyline
PlayEnhMetaFile
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetWinMetaFileBits
GetViewportOrgEx
GetTextMetricsA
GetTextExtentPointA
GetTextExtentPoint32A
GetTextExtentExPointA
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
GetEnhMetaFileBits
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
GdiFlush
ExtTextOutA
ExcludeClipRect
EnumFontFamiliesExA
EndPage
EndDoc
DeleteObject
DeleteEnhMetaFile
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePenIndirect
CreatePen
CreatePalette
CreateICA
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
CopyEnhMetaFileA
CombineRgn
BitBlt
TranslateCharsetInfo
ole32
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
ProgIDFromCLSID
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitialize
IsEqualGUID
olepro32
OleLoadPicture
comctl32
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_GetIcon
ImageList_Remove
ImageList_DrawEx
ImageList_Replace
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
InitCommonControls
winspool.drv
OpenPrinterA
EnumPrintersA
DocumentPropertiesA
ClosePrinter
shell32
Shell_NotifyIconA
SHGetFileInfo
ShellExecuteA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetGetLastResponseInfoA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
FtpSetCurrentDirectoryA
FtpOpenFileA
FtpFindFirstFileA
wsock32
WSACancelBlockingCall
WSAAsyncSelect
gethostname
getservbyname
getprotobyname
gethostbyname
socket
setsockopt
send
recv
ntohs
listen
inet_ntoa
inet_addr
htons
getsockname
getpeername
connect
closesocket
bind
accept
WSAGetLastError
WSAIsBlocking
WSAStartup
shutdown
gdiplus
GdipSetStringFormatHotkeyPrefix
GdipSetPenDashStyle
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipDrawImageRect
GdipGetImageRawFormat
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipFillRectangle
GdipDrawPath
GdipSetTextRenderingHint
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipDeletePen
GdipCreatePen1
GdipGetPathGradientPointCount
GdipSetPathGradientCenterPointI
GdipSetPathGradientSurroundColorsWithCount
GdipSetPathGradientCenterColor
GdipCreatePathGradientFromPath
GdipCreateLineBrushFromRect
GdipCreateSolidFill
GdipDeleteBrush
GdipAddPathEllipse
GdipAddPathArc
GdipAddPathLine
GdipClosePathFigure
GdipDeletePath
GdipCreatePath
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
winmm
sndPlaySoundA
netapi32
Netbios
lz32
LZOpenFileA
LZCopy
LZClose
GetExpandedNameA
comdlg32
GetOpenFileNameA
urlmon
CreateURLMoniker
Sections
.text Size: 1.3MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE