Static task
static1
Behavioral task
behavioral1
Sample
3a2647b6a938dd881eeab7ec35277bb88ba1fd4d2129c408f7baa6b8fb4dd994.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3a2647b6a938dd881eeab7ec35277bb88ba1fd4d2129c408f7baa6b8fb4dd994.exe
Resource
win10v2004-20240412-en
General
-
Target
3a2647b6a938dd881eeab7ec35277bb88ba1fd4d2129c408f7baa6b8fb4dd994
-
Size
1.3MB
-
MD5
7d6226dc9a597a542bb4c1b977dc13a2
-
SHA1
9b3f2b21c11c949c287287a5f99272c3de1cd1b1
-
SHA256
3a2647b6a938dd881eeab7ec35277bb88ba1fd4d2129c408f7baa6b8fb4dd994
-
SHA512
3e85951e589a9617db67553609bc92239de9caa93956866de3d4335073d95260f55fba99bc9377569949dedfd626593ba6808aa89a6c62e0ee7e0e326043f0d7
-
SSDEEP
24576:fgrRiadGNKcy9DDoTWoFWJO14obrRyc85TCleKWVxxax4uJBV1Ls2wBP:orMY1DJK14y8TRVxxaxbJBV1Ls2wB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a2647b6a938dd881eeab7ec35277bb88ba1fd4d2129c408f7baa6b8fb4dd994
Files
-
3a2647b6a938dd881eeab7ec35277bb88ba1fd4d2129c408f7baa6b8fb4dd994.exe windows:4 windows x64 arch:x64
d13f28d72885d0b5146ab2a0a2744164
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
memset
fseek
fread
fclose
ftell
memcpy
log10
_wfopen
wcslen
wcscpy
wcscmp
memmove
wcscat
memcmp
_strdup
sprintf
free
longjmp
_setjmp
_wcsdup
strcpy
wcsncmp
wcsncpy
_snwprintf
_wcsicmp
tolower
fabs
malloc
ceil
floor
pow
??3@YAXPEAX@Z
_wcsnicmp
setlocale
swscanf
wcsstr
realloc
_errno
calloc
fopen
toupper
perror
atan
fprintf
log
cos
sin
ldexp
qsort
exp
sqrt
exit
acos
frexp
memchr
modf
strerror
abort
atof
_gmtime64
fflush
ferror
remove
fwrite
__iob_func
getenv
sscanf
strchr
strstr
isxdigit
strncmp
isalpha
strtol
strncpy
strrchr
strpbrk
strtoul
_time64
_strtoi64
fgets
fputs
atoi
isspace
isdigit
_stricmp
_strnicmp
_read
_write
fputc
isalnum
_stat64
isupper
_vsnwprintf
kernel32
GetModuleHandleW
HeapCreate
OpenProcess
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
VirtualFreeEx
CloseHandle
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
VirtualProtectEx
HeapDestroy
ExitProcess
FormatMessageW
LocalFree
LoadLibraryW
GetProcAddress
GetNativeSystemInfo
GetCurrentProcess
VirtualQueryEx
Process32FirstW
Process32NextW
GetLastError
TerminateProcess
HeapFree
TlsGetValue
HeapAlloc
TlsSetValue
TlsAlloc
UnregisterWait
EnterCriticalSection
LeaveCriticalSection
TlsFree
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThread
DuplicateHandle
RegisterWaitForSingleObject
Sleep
FreeLibrary
CreateThread
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
CreatePipe
GetStdHandle
CreateProcessW
GetCommandLineW
PeekNamedPipe
ReadFile
HeapReAlloc
RtlLookupFunctionEntry
RtlVirtualUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
GetTickCount
WideCharToMultiByte
CreateFileW
DeleteFileW
WriteFile
GlobalLock
GlobalSize
MultiByteToWideChar
GlobalUnlock
GlobalAlloc
GlobalFree
GetVersionExW
QueryPerformanceFrequency
QueryPerformanceCounter
SetLastError
CreateDirectoryW
SetFileAttributesW
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
CopyFileW
GetDriveTypeW
GetFileAttributesW
SetFilePointer
GetFileSize
HeapSize
MulDiv
VerSetConditionMask
VerifyVersionInfoA
LoadLibraryA
SleepEx
ExpandEnvironmentStringsA
FormatMessageA
user32
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongPtrW
GetAsyncKeyState
GetKeyboardState
ShowWindow
SendMessageW
SetClassLongPtrW
RedrawWindow
GetDesktopWindow
GetWindow
GetWindowTextLengthW
GetWindowTextW
WindowFromPoint
FindWindowW
GetKeyNameTextW
MapVirtualKeyW
PeekMessageW
RegisterHotKey
UnregisterHotKey
MessageBoxW
DefWindowProcW
EnableWindow
DestroyWindow
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
GetSystemMetrics
CreateWindowExW
SetWindowLongPtrW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
IsWindowVisible
EnumWindows
SetWindowPos
BeginPaint
EndPaint
SetWindowTextW
CallWindowProcW
RemovePropW
GetPropW
SetPropW
SetScrollPos
GetParent
GetDC
InflateRect
ReleaseDC
GetWindowDC
GetWindowRect
GetIconInfo
InvalidateRect
UpdateWindow
ReleaseCapture
DrawStateW
SetCapture
ScreenToClient
GetClientRect
FillRect
GetSysColor
GetSysColorBrush
SetRect
DrawTextW
GetWindowLongW
SetScrollInfo
GetScrollPos
MoveWindow
GetScrollRange
MapWindowPoints
ClientToScreen
GetFocus
GetClassNameW
EnumPropsExW
SetActiveWindow
DestroyIcon
RegisterClassW
AdjustWindowRectEx
GetMenu
IsZoomed
DefFrameProcW
EnumChildWindows
PostMessageW
GetActiveWindow
MsgWaitForMultipleObjects
GetKeyState
IsChild
RegisterWindowMessageW
EnumDisplaySettingsW
GetCursorPos
CreateIconFromResourceEx
CreateIconFromResource
CharUpperW
CharLowerW
gdi32
CreatePatternBrush
GetStockObject
ExcludeClipRect
GetObjectType
GetObjectW
DeleteObject
SetTextColor
SetBkColor
SelectObject
GetTextExtentPoint32W
CreateSolidBrush
GetDeviceCaps
CreateDCW
DeleteDC
CreateCompatibleDC
CreateDIBSection
SetStretchBltMode
SetBrushOrgEx
StretchBlt
CreateBitmap
SetPixel
GetDIBits
BitBlt
CreateFontW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegCreateKeyW
RegDeleteKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyW
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
ole32
CoInitialize
OleInitialize
CreateStreamOnHGlobal
GetHGlobalFromStream
RevokeDragDrop
OleCreate
OleSetContainedObject
CoTaskMemFree
shell32
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
ws2_32
WSAIoctl
getaddrinfo
freeaddrinfo
wsock32
closesocket
WSACleanup
WSAStartup
socket
inet_addr
gethostbyname
htons
bind
ioctlsocket
connect
select
__WSAFDIsSet
recv
WSAGetLastError
send
WSASetLastError
getsockopt
setsockopt
getpeername
getsockname
ntohs
gethostname
ntohl
htonl
winmm
timeBeginPeriod
gdiplus
GdipDeleteFont
GdipDeleteGraphics
GdipDeletePath
GdipDeleteMatrix
GdipDeletePen
GdipDeleteStringFormat
GdipFree
GdipGetDpiX
GdipGetDpiY
uxtheme
SetWindowTheme
comctl32
InitCommonControlsEx
oleaut32
SysFreeString
SysAllocString
VariantInit
DispGetParam
VariantClear
SysStringLen
Sections
.code Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 682KB - Virtual size: 682KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 302KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ