Static task
static1
Behavioral task
behavioral1
Sample
c3a661382bce615500b2ceb7c4f659ceb3cf8f3be32f66338d1a2ad321504a14.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3a661382bce615500b2ceb7c4f659ceb3cf8f3be32f66338d1a2ad321504a14.exe
Resource
win10v2004-20240419-en
General
-
Target
c3a661382bce615500b2ceb7c4f659ceb3cf8f3be32f66338d1a2ad321504a14
-
Size
906KB
-
MD5
5ae0b653fd454fce725f6e6c8976858b
-
SHA1
cec2d5991b0916aeaa05600a54add4700d78318a
-
SHA256
c3a661382bce615500b2ceb7c4f659ceb3cf8f3be32f66338d1a2ad321504a14
-
SHA512
ef13c02ee5d0b1eb215d5dd7e7fe0713ed338285af34813d5d660f7d58376ef8bac60e18d43691f3bdaec33458b5778ec28edbdd3357bb2d7c1baae2af753a9c
-
SSDEEP
24576:B0alcPumTzvLYqWzwSVd9/5xgUExIlhSMXl1TE:B0huYE9/bEu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3a661382bce615500b2ceb7c4f659ceb3cf8f3be32f66338d1a2ad321504a14
Files
-
c3a661382bce615500b2ceb7c4f659ceb3cf8f3be32f66338d1a2ad321504a14.exe windows:6 windows x64 arch:x64
676508cb9b00b3395cb17adb8ea0ece2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
d2d1
ord1
dwrite
DWriteCreateFactory
api-ms-win-shcore-scaling-l1-1-1
GetProcessDpiAwareness
GetDpiForMonitor
shell32
ShellExecuteW
DragFinish
DragAcceptFiles
DragQueryFileW
comctl32
InitCommonControlsEx
ord345
ole32
CoCreateInstance
CoTaskMemFree
CoGetObjectContext
CoGetApartmentType
CoUninitialize
CoInitialize
kernel32
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
InitializeCriticalSectionEx
GetLastError
HeapSetInformation
DecodePointer
DeleteCriticalSection
ReadFile
GetFileSizeEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
CreateFileW
GetFileAttributesW
GetCurrentThreadId
OpenProcess
GlobalAlloc
CloseHandle
RaiseException
GlobalLock
GetCurrentProcessId
GetModuleHandleW
MulDiv
GetFileInformationByHandleEx
WriteFile
DeleteFileW
MoveFileExW
GetFinalPathNameByHandleW
GetModuleFileNameW
MultiByteToWideChar
FormatMessageW
LocalFree
IsValidCodePage
GetStringTypeW
SetEndOfFile
ReadConsoleW
LCMapStringW
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
ExitProcess
GetCPInfo
RtlUnwind
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwindEx
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
FreeEnvironmentStringsW
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
InitializeSListHead
GetProcessHeap
SetFilePointerEx
FormatMessageA
HeapFree
HeapAlloc
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
RtlPcToFileHeader
WriteConsoleW
GetLocaleInfoEx
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceComplete
InitOnceBeginInitialize
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetProcAddress
WideCharToMultiByte
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
IsDebuggerPresent
OutputDebugStringW
EncodePointer
user32
GetKeyState
LoadMenuW
CallWindowProcW
MonitorFromPoint
GetWindowRect
DestroyWindow
SetWindowPos
MessageBoxW
GetDpiForWindow
SetWindowLongPtrW
CreateWindowExW
ScreenToClient
SendMessageW
SetWindowTextW
MessageBeep
GetWindowLongPtrW
RegisterClassExW
GetWindowPlacement
DefWindowProcW
OpenClipboard
CloseClipboard
EmptyClipboard
ValidateRect
DestroyMenu
ChangeWindowMessageFilter
SetForegroundWindow
LoadCursorW
InsertMenuW
SetClipboardData
TrackPopupMenuEx
GetClientRect
PostQuitMessage
EnableMenuItem
GetClassInfoExW
InvalidateRect
GetCursorPos
GetMessageW
UnregisterClassW
ShowWindow
DispatchMessageW
TranslateMessage
UpdateWindow
GetSystemMenu
GetSubMenu
LoadIconW
gdi32
GetObjectW
DeleteObject
CreateSolidBrush
CreateFontIndirectW
SetBkMode
SetTextColor
GetStockObject
comdlg32
ChooseColorW
Sections
.text Size: 577KB - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ