Static task
static1
Behavioral task
behavioral1
Sample
c3f6118b9b65609de469648115456e32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3f6118b9b65609de469648115456e32.exe
Resource
win10v2004-20240226-en
General
-
Target
c3f6118b9b65609de469648115456e32
-
Size
177KB
-
MD5
c3f6118b9b65609de469648115456e32
-
SHA1
da53308e3cea3e57b4c3af6711e6bee0dfc93944
-
SHA256
7dfe079cc938d47611f611801a271208e9843e58ec2ebdbc4a5c981768c94701
-
SHA512
b6fd909b7099dca626d38c47d44c8709aa53f6e95dc2161e92495cb99777a76c2a15722736f961f71df0abb60a4eb58c5f04961f69af98e4ea46a6c1c0be8d8f
-
SSDEEP
3072:dmK4wBe8DZS34pcBl5lwM12cNRcrOgPtCWWfqLndxBx2a8pvXXXXXX:dmK4se8DuawreM0KyrOQM7qThMdp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3f6118b9b65609de469648115456e32
Files
-
c3f6118b9b65609de469648115456e32.exe windows:1 windows x86 arch:x86
d4683d3049641f1562e9f167acd88faf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryInfoKeyA
RegConnectRegistryA
RegCloseKey
RegEnumKeyA
RegFlushKey
RegQueryValueExA
RegCreateKeyExA
gdi32
GetViewportOrgEx
SetBitmapBits
SetViewportOrgEx
RealizePalette
GetDeviceCaps
RestoreDC
EnumFontsA
SaveDC
UnrealizeObject
GetTextColor
SetDIBits
GetWorldTransform
SetWindowOrgEx
SetWindowExtEx
GetSystemPaletteEntries
PaintRgn
BitBlt
StretchDIBits
GetPath
CreateDIBitmap
PtInRegion
SetMapMode
user32
SetMenu
GetClassLongA
GetWindowPlacement
DeleteMenu
LoadStringA
wsprintfA
EnumChildWindows
TrackPopupMenu
CharLowerA
CascadeChildWindows
GetMenuItemCount
EnableMenuItem
CharUpperBuffA
ChangeMenuA
GetFocus
LoadIconA
EndPaint
GetCursorPos
PostMessageA
GetWindowThreadProcessId
GetWindow
CreateCursor
CreateMenu
LoadMenuA
AttachThreadInput
GetMessageA
GetMenuItemID
SetActiveWindow
SetScrollInfo
GetSystemMenu
AppendMenuA
ExitWindowsEx
RegisterClassExA
CheckMenuItem
GetMenuStringA
LoadCursorA
EnableWindow
GetMenuState
FrameRect
AdjustWindowRect
SetClassLongA
kernel32
InterlockedIncrement
SetConsoleScreenBufferSize
ExitProcess
GetCurrentProcess
GetCurrentProcessId
FindResourceA
LoadResource
CreateProcessA
SizeofResource
LoadLibraryA
LocalAlloc
LocalFree
VirtualProtectEx
UnmapViewOfFile
CreateConsoleScreenBuffer
OpenFileMappingA
GetProcAddress
GetCurrencyFormatA
GetModuleHandleA
lstrcmpi
CloseHandle
MapViewOfFile
GetLastError
GetWindowsDirectoryA
ReadFile
GetFileSize
SuspendThread
DuplicateHandle
GlobalSize
GetVersionExA
WriteConsoleA
SetStdHandle
TlsAlloc
GetFullPathNameA
CreateFileA
FindNextFileA
SetCommState
lstrcmpA
AllocConsole
GetLocaleInfoA
ConnectNamedPipe
InterlockedDecrement
GetCommTimeouts
WriteFile
SetConsoleCP
GetDateFormatA
FreeLibrary
FindClose
ReadConsoleA
GetConsoleCP
GlobalFree
Beep
OpenSemaphoreA
GetThreadPriority
GetFileType
SetConsoleMode
TlsSetValue
PurgeComm
ReleaseMutex
ClearCommBreak
GlobalAlloc
LoadModule
WaitForSingleObject
WriteConsoleInputA
GetCommMask
CreateMutexA
GetExitCodeThread
CreateNamedPipeA
CreateThread
GetEnvironmentVariableA
GetModuleFileNameA
Sleep
CreateFileMappingA
SetThreadPriority
SystemTimeToFileTime
SetCommMask
GetLocalTime
SetConsoleOutputCP
DeleteAtom
SetEndOfFile
SetEvent
CreateEventA
GetTempPathA
SetFileAttributesA
GetCPInfo
UnlockFile
SetFileTime
GetLogicalDrives
RemoveDirectoryA
WaitForMultipleObjects
CreateSemaphoreA
SetCommTimeouts
GetConsoleOutputCP
DeviceIoControl
EnterCriticalSection
MoveFileA
GlobalLock
GetDiskFreeSpaceA
FileTimeToLocalFileTime
SetConsoleCursorPosition
SetLocalTime
GetACP
GetCommandLineA
GetSystemInfo
TlsFree
GlobalHandle
GetLogicalDriveStringsA
WaitCommEvent
TlsGetValue
LocalReAlloc
ClearCommError
OpenEventA
FileTimeToDosDateTime
ExitThread
OpenProcess
ResetEvent
SetPriorityClass
GetExitCodeProcess
LockFile
SetConsoleTextAttribute
GetDriveTypeA
GlobalUnlock
SetConsoleTitleA
GetPriorityClass
CallNamedPipeA
GetCommState
DeleteCriticalSection
SetFilePointer
GetCommConfig
wsock32
listen
ntohl
gethostname
accept
htonl
ntohs
getsockname
htons
shutdown
recvfrom
closesocket
getpeername
recv
sendto
WSAStartup
connect
bind
gethostbyaddr
select
send
setsockopt
socket
WSACleanup
gethostbyname
WSAGetLastError
inet_ntoa
Sections
CODE Size: 9KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DGROUP Size: 4KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 7KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 152KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ