Static task
static1
Behavioral task
behavioral1
Sample
3fc75983ed3c5ac1879d862760523e2986907fc9a177c9b740b5b36e6e28f9d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3fc75983ed3c5ac1879d862760523e2986907fc9a177c9b740b5b36e6e28f9d9.exe
Resource
win10v2004-20240226-en
General
-
Target
3fc75983ed3c5ac1879d862760523e2986907fc9a177c9b740b5b36e6e28f9d9
-
Size
337KB
-
MD5
6b50f4c0c2680b858660f4fac7da7997
-
SHA1
d072d2599c066127bbe7498a22d6be36cb2520a0
-
SHA256
3fc75983ed3c5ac1879d862760523e2986907fc9a177c9b740b5b36e6e28f9d9
-
SHA512
5a2d0145a027f6291d6b44e01f162877a90f75f9430244279c4ff3dad20a3bd7c7d8f3579e589d8f43855b936f81bdd6735cca4d1e075b35dc524a42593c3718
-
SSDEEP
6144:x10dQ9HvBKnLUJwsPnER47ST0vfnRX3yZY4J2laK92:xBHvwnLUO1R47S6fRny2n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fc75983ed3c5ac1879d862760523e2986907fc9a177c9b740b5b36e6e28f9d9
Files
-
3fc75983ed3c5ac1879d862760523e2986907fc9a177c9b740b5b36e6e28f9d9.exe windows:6 windows x64 arch:x64
f9d51cbf93f59e271be87e2e29132112
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
Sleep
CreateFileA
SetEvent
GetDiskFreeSpaceExW
GetCurrentThread
TerminateThread
LoadLibraryA
GetNativeSystemInfo
CreateThread
GetWindowsDirectoryA
SetVolumeMountPointW
GetWindowsDirectoryW
GetProcAddress
SetFilePointerEx
DeleteCriticalSection
ExitProcess
GetCurrentProcessId
GetModuleHandleW
CopyFileW
WideCharToMultiByte
GetVolumePathNamesForVolumeNameW
lstrcpyW
SleepEx
GetDiskFreeSpaceExA
CreateEventA
FindNextVolumeW
lstrcmpiW
CreateIoCompletionPort
GetTickCount
lstrcmpW
MoveFileW
GetDriveTypeW
GetFileTime
GetComputerNameA
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
QueryDosDeviceW
GetFinalPathNameByHandleW
K32GetModuleFileNameExW
DuplicateHandle
CreateEventW
FindVolumeClose
GetFileType
GetTickCount64
lstrcatW
GetSystemTimeAsFileTime
GetSystemInfo
GlobalMemoryStatusEx
WriteConsoleW
SetEndOfFile
ReadConsoleW
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFileAttributesW
PostQueuedCompletionStatus
GetLocaleInfoA
GetModuleHandleA
GetCurrentThreadId
GetFileAttributesW
CreateFileW
WaitForSingleObject
FindClose
lstrlenA
GetQueuedCompletionStatus
SetErrorMode
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
GetUserDefaultLangID
WriteFile
FindNextFileW
GetCommandLineW
EnterCriticalSection
FindFirstVolumeW
lstrlenW
FindFirstFileExW
GetFileSizeEx
GetLogicalDrives
GetVolumeInformationW
ReadFile
LocalFree
CloseHandle
GetLastError
GetCurrentProcess
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
QueryPerformanceCounter
Process32NextW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapAlloc
HeapFree
HeapReAlloc
GetStdHandle
GetModuleHandleExW
LoadLibraryExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
user32
CreateWindowExW
GetCursorPos
MessageBoxW
DefWindowProcW
RegisterClassW
advapi32
RegCloseKey
OpenProcessToken
SetNamedSecurityInfoW
ControlService
EnumDependentServicesW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
QueryServiceStatusEx
CreateServiceW
CryptAcquireContextW
CloseServiceHandle
RegQueryValueExA
CryptGenRandom
OpenSCManagerW
RegSetValueExW
StartServiceW
RegOpenKeyExA
RegOpenKeyExW
OpenThreadToken
CryptReleaseContext
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
FreeSid
shell32
CommandLineToArgvW
ShellExecuteW
netapi32
NetShareEnum
NetApiBufferFree
shlwapi
wnsprintfA
StrCmpNIW
StrCmpNW
StrStrIW
PathFileExistsW
SHDeleteKeyW
UrlUnescapeA
UrlEscapeA
wnsprintfW
iphlpapi
GetIpNetTable
ws2_32
inet_ntoa
wininet
InternetQueryDataAvailable
InternetCloseHandle
InternetConnectW
InternetSetOptionW
InternetCrackUrlW
InternetOpenW
InternetQueryOptionW
HttpOpenRequestW
InternetReadFile
HttpSendRequestW
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ