Static task
static1
Behavioral task
behavioral1
Sample
3ee647f0e6bc672207062fa957284767.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ee647f0e6bc672207062fa957284767.exe
Resource
win10v2004-20231222-en
General
-
Target
3ee647f0e6bc672207062fa957284767
-
Size
480KB
-
MD5
3ee647f0e6bc672207062fa957284767
-
SHA1
42c077965801edab4e0640eb63f71f5c4b9060e8
-
SHA256
8deee907ac1ced6848bb6bc67072f732e37e3160f614a24dc3d84cfea03fb495
-
SHA512
9741237abfefba1757bfe888b5dc212df09d67b323f538bc9b0d7f828b1909f470ffa27f6af812f872628834811466807be44c19237aee9dc931f9072dd103c3
-
SSDEEP
12288:5QkIAsmE9xqa07HFdMFZ10tJax2klwNyTrG25:5QnT07ldq0tU2kOcTrG8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ee647f0e6bc672207062fa957284767
Files
-
3ee647f0e6bc672207062fa957284767.exe windows:4 windows x86 arch:x86
91715c05dd100c9de544b578d8b3aedb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord3056
ord4115
ord2020
ord354
ord1903
ord1964
ord3684
ord1728
ord5642
ord1280
ord5731
ord5727
ord3139
ord3679
ord563
ord1191
ord2249
ord332
ord1092
ord2055
ord4580
ord6305
ord6306
ord2248
ord1054
ord1100
ord5119
ord5975
ord3109
ord3110
ord3210
ord3163
ord3204
ord3244
ord2094
ord4100
ord3315
ord4261
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2991
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord5175
ord1362
ord4967
ord3345
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord572
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord4244
ord1402
ord3946
ord1617
ord1620
ord5915
ord6725
ord1589
ord1647
ord3292
ord1581
ord1643
ord3304
ord3174
ord3255
ord3200
ord4262
ord4719
ord1401
ord5912
ord6724
ord1670
ord1671
ord4890
ord4734
ord4211
ord5182
ord4910
ord4625
ord4584
ord4464
ord4494
ord4972
ord4481
ord2838
ord5567
ord5213
ord5230
ord4569
ord3948
ord5227
ord5224
ord2931
ord1920
ord3333
ord5566
ord4568
ord5226
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3182
ord4735
ord4212
ord3327
ord1597
ord1653
ord1740
ord2754
ord2747
ord4749
ord709
ord501
ord4353
ord5152
ord6067
ord6065
ord1908
ord5993
ord2617
ord5991
ord6283
ord6144
ord2372
ord3401
ord2371
ord1283
ord1063
ord1425
ord5203
ord6063
ord3758
ord6090
ord6277
ord753
ord3641
ord605
ord334
ord566
ord3683
ord757
ord1091
ord3088
ord2021
ord385
ord1084
ord1123
ord628
ord378
ord3595
ord559
ord570
ord762
ord3635
ord759
ord1412
ord2164
ord2657
ord6236
ord1551
ord1793
ord1892
ord1794
ord3636
ord630
ord747
ord1187
ord730
ord715
ord739
ord1955
ord1934
ord1181
ord5331
ord5320
ord6286
ord6297
ord1185
ord1580
ord1064
ord1090
ord593
ord2346
ord932
ord764
ord1207
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_crt_debugger_hook
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_unlock
memset
memcpy
_open_osfhandle
_fdopen
setvbuf
_mbscmp
_set_invalid_parameter_handler
_vscprintf
vsprintf_s
_mbsrchr
strstr
fflush
ferror
memmove
fputc
isxdigit
toupper
isspace
isalpha
realloc
putc
ungetc
fwrite
__iob_func
fprintf
strrchr
printf
fopen
_errno
perror
fseek
ftell
fread
strncmp
getc
atol
fclose
sprintf
_ftime64
__CxxFrameHandler
isdigit
atoi
strncpy
_setmbcp
_strdup
_getch
_sopen
_read
_lseek
_write
_close
_stricmp
memmove_s
memcpy_s
_except_handler3
free
malloc
_resetstkoflw
kernel32
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetLastError
InterlockedDecrement
InterlockedIncrement
Sleep
SetEvent
SetConsoleCtrlHandler
SetPriorityClass
GetPriorityClass
GetCurrentProcess
ExitThread
GetModuleFileNameA
lstrcpynA
ResetEvent
CloseHandle
OpenFile
TerminateThread
ReadFile
FreeConsole
LocalFree
FormatMessageA
WaitForSingleObject
WaitForMultipleObjects
FlushFileBuffers
SetThreadPriority
CreateThread
CreatePipe
InitializeCriticalSection
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
RaiseException
InterlockedCompareExchange
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FindResourceA
InterlockedExchange
LoadResource
LockResource
GetExitCodeThread
WideCharToMultiByte
GetThreadLocale
GetACP
GetLocaleInfoA
GetVersionExA
SizeofResource
user32
AppendMenuA
ModifyMenuA
DeleteMenu
GetSystemMenu
wsprintfA
IsIconic
GetSystemMetrics
DrawIcon
LoadIconA
DestroyIcon
SetActiveWindow
GetCursorPos
BringWindowToTop
SetMenuDefaultItem
GetMenu
GetMenuItemCount
GetMenuItemID
FillRect
GetKeyState
GetClientRect
LoadMenuA
GetSubMenu
SetForegroundWindow
GetParent
PostMessageA
SetTimer
MessageBoxA
SendMessageA
EnableWindow
KillTimer
gdi32
CreateSolidBrush
GetTextExtentPoint32A
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ