Static task
static1
Behavioral task
behavioral1
Sample
3d98705a2eb1e317e9f0e5405b59b0ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d98705a2eb1e317e9f0e5405b59b0ea.exe
Resource
win10v2004-20231215-en
General
-
Target
3d98705a2eb1e317e9f0e5405b59b0ea
-
Size
1.1MB
-
MD5
3d98705a2eb1e317e9f0e5405b59b0ea
-
SHA1
d10d750c0b6cb292aae816f129f3f1ad242e2252
-
SHA256
4179d82837d6c8fee79579a4f72272c247728ed15275b157d807a01932056960
-
SHA512
edd96b655dbc69a9fcf016950fa18041fe8505ddfd0a4c6b70c51f076f876f5ef47581b4a3b00fa2172113311625e4b4ef0ee96420ca853138370c5045a7afbf
-
SSDEEP
24576:999rY1zVZbYXoQ2KadqPZBHlzMgchMWz/QJ2TXps:99o6N20ZB9TLQTX+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d98705a2eb1e317e9f0e5405b59b0ea
Files
-
3d98705a2eb1e317e9f0e5405b59b0ea.exe windows:4 windows x86 arch:x86
c2512931a073ae2bf96de0f97502ad4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
storm
ord137
ord139
ord106
ord119
ord109
ord130
ord115
ord138
ord451
ord140
ord120
ord123
ord102
ord122
ord121
ord128
ord127
ord462
ord134
ord101
ord117
ord116
ord261
ord257
ord264
ord440
ord436
ord443
ord438
ord432
ord354
ord437
ord468
ord351
ord523
ord524
ord529
ord525
ord452
ord334
ord331
ord332
ord275
ord571
ord255
ord258
ord494
ord423
ord272
ord266
ord252
ord502
ord508
ord118
ord133
ord103
ord501
ord424
ord421
ord321
ord105
ord112
ord107
ord457
ord454
ord458
ord386
ord389
ord393
ord390
ord385
ord383
ord314
ord216
ord422
ord425
ord206
ord211
ord431
ord221
ord434
ord445
ord125
ord113
ord222
ord357
ord346
ord208
ord114
ord572
ord323
ord325
ord269
ord265
ord253
ord267
ord268
ord463
ord276
ord274
ord342
ord442
ord465
ord506
ord509
ord503
ord350
ord356
ord256
ord453
ord260
ord313
ord426
ord401
ord403
shell32
FindExecutableA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
kernel32
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
RtlUnwind
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
GetLocaleInfoA
TlsGetValue
SetLastError
TlsAlloc
LCMapStringW
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
GetVersion
GetStartupInfoA
SetConsoleCtrlHandler
ExitThread
TlsSetValue
CreateThread
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetFileSize
RaiseException
GetStringTypeA
GetStringTypeW
VirtualAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
SetFilePointer
SetEndOfFile
ReadFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
TerminateProcess
GetCurrentProcess
FindResourceA
LoadLibraryA
GetProcAddress
GetCurrentThreadId
SetEvent
CreateDirectoryA
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
SizeofResource
LoadResource
LockResource
GetModuleFileNameA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTickCount
Sleep
IsBadReadPtr
GetModuleHandleA
VirtualQuery
lstrcpynA
IsBadWritePtr
FormatMessageA
SetUnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
GetSystemInfo
CreateProcessA
GetLastError
CloseHandle
WaitForMultipleObjects
MulDiv
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetFileAttributesA
WaitForSingleObject
CreateEventA
GetLogicalDriveStringsA
GetCommandLineA
GlobalMemoryStatus
GetDiskFreeSpaceA
user32
TranslateMessage
GetDC
ClipCursor
LoadStringA
LoadAcceleratorsA
IsIconic
PtInRect
DestroyAcceleratorTable
ReleaseCapture
SetCapture
PostMessageA
GetKeyState
SetFocus
FindWindowA
ShowCursor
SetCursorPos
GetCursorPos
SetCursor
LoadCursorA
EndPaint
BeginPaint
DefWindowProcA
LoadIconA
DispatchMessageA
PeekMessageA
GetMessageA
TranslateAcceleratorA
GetWindow
GetClassNameA
GetForegroundWindow
GetDesktopWindow
SetRect
GetActiveWindow
ReleaseDC
RegisterClassA
SendMessageA
GetDlgItem
GetWindowLongA
InvalidateRect
OffsetRect
GetWindowRect
GetParent
SendDlgItemMessageA
ShowWindow
EnableWindow
UpdateWindow
DrawTextA
GetSysColor
GetFocus
ScreenToClient
GetClientRect
SetWindowLongA
MessageBoxA
SetWindowTextA
SetActiveWindow
SetForegroundWindow
EnumWindows
GetWindowThreadProcessId
WaitForInputIdle
KillTimer
SetTimer
DialogBoxParamA
SetDlgItemTextA
SetWindowPos
EndDialog
GetTopWindow
GetLastActivePopup
CreateWindowExA
GetSystemMetrics
gdi32
GetPaletteEntries
DeleteDC
GetTextExtentPoint32A
SelectObject
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
DeleteObject
GetTextMetricsA
ExtTextOutA
GetTextExtentExPointA
SetTextColor
SetBkColor
SetTextAlign
TextOutA
MoveToEx
CreateFontA
GetDeviceCaps
GetStockObject
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
advapi32
RegDeleteValueA
GetUserNameA
RegOpenKeyA
Sections
.text Size: 908KB - Virtual size: 908KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 88KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE