Static task
static1
Behavioral task
behavioral1
Sample
3e6bc220c98388db4bc2abf5dcc329d1495ce528a41d49583742f1f584d24132.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e6bc220c98388db4bc2abf5dcc329d1495ce528a41d49583742f1f584d24132.exe
Resource
win10v2004-20240419-en
General
-
Target
3e6bc220c98388db4bc2abf5dcc329d1495ce528a41d49583742f1f584d24132
-
Size
4.8MB
-
MD5
d1b6ca5e8980c2a8ca8468280d959460
-
SHA1
9c96dee79dd00d4027e0c190b299da611c861171
-
SHA256
3e6bc220c98388db4bc2abf5dcc329d1495ce528a41d49583742f1f584d24132
-
SHA512
b638d6910e58d766b55ec2752777004727538feed3ad0ced0e0ff4f00696664a8b674966c4e79a6624ff45dba1272374f71947d4bc96605a4e9b8e8605b76334
-
SSDEEP
98304:w0gN0sGko6+63izgV+zYOeyx/HqaU+tuWH6aw/Hv:w0YGklNpTgx/t9uW6aw/Hv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e6bc220c98388db4bc2abf5dcc329d1495ce528a41d49583742f1f584d24132
Files
-
3e6bc220c98388db4bc2abf5dcc329d1495ce528a41d49583742f1f584d24132.exe windows:6 windows x86 arch:x86
22730d6b0b7fbe50184a3d3a0d7dbf9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreatePen1
GdiplusStartup
GdipFree
GdipGetImageWidth
GdipDeletePen
GdipCloneImage
GdipGetImageHeight
GdipAlloc
GdipDrawImageRect
GdipDrawLineI
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromStream
GdipDisposeImage
comctl32
InitCommonControlsEx
ord17
shlwapi
PathFindFileNameW
PathAddBackslashW
SHDeleteKeyW
PathFileExistsW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
wininet
InternetCanonicalizeUrlW
kernel32
LoadLibraryExW
GetConsoleMode
GetConsoleCP
GetLastError
GetModuleHandleW
CompareFileTime
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileSize
GetFileTime
ReadFile
RemoveDirectoryW
SetFileAttributesW
SetFilePointer
WriteFile
CloseHandle
WaitForSingleObject
Sleep
CreateProcessW
GetProcAddress
LoadLibraryW
LocalFree
FormatMessageW
MoveFileExW
VerSetConditionMask
VerifyVersionInfoW
FreeLibrary
FindResourceExW
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalUnlock
GlobalLock
GetThreadUILanguage
GetTempPathW
GetStdHandle
OpenProcess
CompareStringW
ExpandEnvironmentStringsW
GetCurrentThread
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
MultiByteToWideChar
WideCharToMultiByte
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
GetFileType
InitializeCriticalSectionAndSpinCount
SetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FlushFileBuffers
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
HeapSize
WriteConsoleW
GetCurrentProcess
SetEndOfFile
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
TranslateMessage
GetMessageW
LoadAcceleratorsW
SetForegroundWindow
UpdateWindow
IsIconic
HideCaret
InvalidateRect
KillTimer
SetTimer
IsWindow
GetDlgCtrlID
SendDlgItemMessageW
SetFocus
GetDlgItem
PeekMessageW
LoadIconW
SetClassLongW
SetWindowLongW
GetWindowLongW
FillRect
GetSysColorBrush
GetSysColor
ClientToScreen
MessageBoxW
GetWindowRect
GetClientRect
SetWindowTextW
GetPropW
SetPropW
EndPaint
BeginPaint
EnableWindow
SetWindowPos
ShowWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
TranslateAcceleratorW
GetParent
IsDialogMessageW
SystemParametersInfoW
MonitorFromRect
DispatchMessageW
GetMonitorInfoW
GetShellWindow
GetWindowThreadProcessId
CreateDialogParamW
LoadCursorW
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
DeleteDC
DeleteObject
SelectObject
shell32
SHFileOperationW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
SHGetSpecialFolderPathW
SHChangeNotify
ole32
CoCreateInstance
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
advapi32
RegDeleteValueW
RevertToSelf
ImpersonateSelf
DuplicateTokenEx
OpenThreadToken
OpenProcessToken
RegSetValueExW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
Sections
.text Size: 406KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47.9MB - Virtual size: 47.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ