Static task
static1
Behavioral task
behavioral1
Sample
3e4b83591b994454814da44496e0d623.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e4b83591b994454814da44496e0d623.exe
Resource
win10v2004-20231215-en
General
-
Target
3e4b83591b994454814da44496e0d623
-
Size
412KB
-
MD5
3e4b83591b994454814da44496e0d623
-
SHA1
a3926d3a707eff55b435a6b739b7d7afadb5cb64
-
SHA256
53edc85b185df728121fd2008c4be23f107da436e25d363c7166a8a795a2f5af
-
SHA512
de3d94a473f2eac033c856927e1e726b1fe909c70a8da23c260b175f775d5351c8efa3ef84c006fa85ac730b9c0ce9ca073d27b7545505c3ac07e7ccef48cd57
-
SSDEEP
6144:eOzQlxjQR/pjkroAvH+WmXbOg+5jfdbRS8h3bLnWcrMFS8aBdi:RklxjQR/xkrH8OVPbZZ/WcQ4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e4b83591b994454814da44496e0d623
Files
-
3e4b83591b994454814da44496e0d623.exe windows:4 windows x86 arch:x86
06dbf925d52fb872a3feffd8ac3abf42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
FileTimeToSystemTime
WritePrivateProfileStringW
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
VirtualQuery
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
TlsGetValue
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetCurrentDirectoryA
GetDriveTypeA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
SetEnvironmentVariableA
LocalAlloc
GlobalFlags
GetModuleHandleA
InterlockedDecrement
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
GetCurrentProcessId
CreateEventW
SuspendThread
SetEvent
WaitForSingleObject
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameW
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalAlloc
lstrlenW
MulDiv
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
DeleteFileW
FormatMessageW
LocalFree
GetTickCount
SetCurrentDirectoryW
GetCurrentThreadId
SetFileAttributesW
WriteFile
SetFileTime
GetCurrentDirectoryW
GetFileAttributesW
CreateDirectoryW
WideCharToMultiByte
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
CreateFileW
ReadFile
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
CloseHandle
GetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
WaitForDebugEvent
GetSystemInfo
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetThreadContext
SetThreadContext
ContinueDebugEvent
ReadProcessMemory
ResumeThread
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
FreeEnvironmentStringsW
SizeofResource
user32
UnregisterClassW
DrawTextW
TabbedTextOutW
ReleaseDC
GetDC
CharUpperW
GetWindowThreadProcessId
SetCursor
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
ShowWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
GetForegroundWindow
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindow
SetFocus
GetMenuState
GetMenuItemID
DestroyMenu
LoadCursorW
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringW
GetLastActivePopup
DrawTextExW
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
wsprintfW
LoadImageW
OemToCharW
PostQuitMessage
GetSystemMetrics
LoadIconW
PostThreadMessageW
KillTimer
SetTimer
GetClientRect
IsIconic
PostMessageW
DrawIcon
SendMessageW
EnableWindow
GetSysColor
UnregisterClassA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
SHBrowseForFolderW
SHGetMalloc
SHGetFolderPathW
SHGetPathFromIDListW
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
WSACleanup
gethostbyname
closesocket
htons
inet_addr
accept
WSAStartup
select
bind
WSAGetLastError
getpeername
WSASetLastError
inet_ntoa
ntohs
socket
connect
sendto
shutdown
ntohl
htonl
recv
send
WSAAsyncSelect
recvfrom
Sections
.text Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE