Static task
static1
Behavioral task
behavioral1
Sample
a3b533840ec2ed8d1d4ee209c6b9c08f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3b533840ec2ed8d1d4ee209c6b9c08f.exe
Resource
win10v2004-20240221-en
General
-
Target
a3b533840ec2ed8d1d4ee209c6b9c08f
-
Size
3.9MB
-
MD5
a3b533840ec2ed8d1d4ee209c6b9c08f
-
SHA1
f17d0944df70d4b9311f27d0ec55ff610beef6e6
-
SHA256
ca09ef03b361740eba79e97806bd95465af52cfb042505278bdc1a53e5bf27ee
-
SHA512
d54d3a3536a86efc86c01e37ad9cde5d6953ebd2d413b79d677520c340153e1c1ccea008717eb23c36a2b014ed475ecf96f6a6a886e8e9723d24e9c2c8f3cc66
-
SSDEEP
49152:8GtlqURAIU6iL6EPKkevQ1Xdozf3kvuFtFFV0yHdRs/0Cxe1qUaLfpgHAS2sdJ2d:z/+LdA3kvuFtdrcYHdJxETsX2ju
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3b533840ec2ed8d1d4ee209c6b9c08f
Files
-
a3b533840ec2ed8d1d4ee209c6b9c08f.exe windows:6 windows x64 arch:x64
c61aaa040951be678c287fba03b38857
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DecodePointer
HeapDestroy
GetWindowsDirectoryW
GetProcAddress
LocalFree
GetFileSize
DeleteCriticalSection
GetProcessHeap
FreeLibrary
GetConsoleWindow
CreateDirectoryA
lstrcmpiW
IsDebuggerPresent
SetFileAttributesA
HeapAlloc
LoadLibraryW
FreeConsole
RaiseException
HeapReAlloc
DeleteFileW
LoadLibraryA
SetConsoleScreenBufferInfoEx
GetConsoleMode
Sleep
HeapSize
CreateMutexA
GetConsoleScreenBufferInfoEx
InitializeCriticalSectionEx
LoadLibraryExA
VirtualAlloc
SetConsoleMode
GetStdHandle
GetCurrentProcess
SetConsoleTitleA
VirtualFree
SetConsoleTextAttribute
HeapFree
GetModuleFileNameA
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
GetTimeZoneInformation
FlushFileBuffers
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleOutputCP
GetCommandLineW
GetCommandLineA
SetConsoleCtrlHandler
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
OutputDebugStringW
GetCPInfo
CompareStringEx
EncodePointer
LCMapStringEx
DeviceIoControl
MultiByteToWideChar
GetModuleFileNameW
lstrlenW
WaitNamedPipeW
GetCurrentProcessId
CloseHandle
GetLastError
CreateFileW
PeekNamedPipe
WriteFile
ReadFile
GetStringTypeW
RtlUnwind
GetFileInformationByHandleEx
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
WideCharToMultiByte
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
GetModuleHandleW
GetSystemTimeAsFileTime
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetCurrentDirectoryW
FindFirstFileExW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
MoveFileExW
user32
UnhookWindowsHookEx
EnableMenuItem
FindWindowA
GetAsyncKeyState
ShowWindow
SetWindowPos
GetWindowRect
GetSystemMenu
GetWindowThreadProcessId
GetWindowLongA
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
MoveWindow
SetWindowLongA
PostThreadMessageA
SetWindowsHookExA
advapi32
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptAcquireContextA
CryptGetHashParam
ConvertSidToStringSidA
CopySid
IsValidSid
OpenProcessToken
GetLengthSid
GetTokenInformation
GetUserNameA
RegCloseKey
RegCreateKeyExW
RegSetValueExW
CryptReleaseContext
CryptEnumProvidersW
shell32
ShellExecuteW
ShellExecuteA
ws2_32
closesocket
accept
send
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
inet_pton
WSAGetLastError
socket
htonl
ioctlsocket
recv
getaddrinfo
freeaddrinfo
ntohl
recvfrom
gethostname
getnameinfo
WSACleanup
shutdown
sendto
listen
wldap32
ord211
ord46
ord45
ord33
ord50
ord60
ord41
ord35
ord22
ord26
ord27
ord143
ord301
ord79
ord200
ord30
ord32
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertAddCertificateContextToStore
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertDuplicateCertificateContext
CertGetCertificateContextProperty
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
userenv
UnloadUserProfile
rpcrt4
UuidToStringA
UuidCreate
RpcStringFreeA
ntdll
RtlVirtualUnwind
RtlCaptureContext
RtlLookupFunctionEntry
VerSetConditionMask
RtlImageNtHeader
bcrypt
BCryptGenRandom
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 823KB - Virtual size: 823KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ