Static task
static1
Behavioral task
behavioral1
Sample
f3dcdf72410967db6a1ba81a34b4bf6b835dc5b62255788ab32c1c70673de6b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f3dcdf72410967db6a1ba81a34b4bf6b835dc5b62255788ab32c1c70673de6b2.exe
Resource
win10v2004-20240426-en
General
-
Target
f3dcdf72410967db6a1ba81a34b4bf6b835dc5b62255788ab32c1c70673de6b2
-
Size
2.8MB
-
MD5
efae2ecc3ce90c6bc0cee92196f71eb1
-
SHA1
63d0061a71577f781910b28e69ec75671d72a7d0
-
SHA256
f3dcdf72410967db6a1ba81a34b4bf6b835dc5b62255788ab32c1c70673de6b2
-
SHA512
66692c0868f42a7e2f3b3c93087e99bf3002b546043c3515ec8a4bb1671b2e7f198e80c2db8d295cc98344fd6d6319d71a85a817ddd72e9a039824edba7cfaa8
-
SSDEEP
49152:GxVZBm/u7MEZohLqwpMVVYOiat/57wJzmfqWX1bv4KCIxYKMHQp6gxm4fWU/SFl5:iZBmRLJpMVbX1zgIvxm9Gq/il4cF63hR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3dcdf72410967db6a1ba81a34b4bf6b835dc5b62255788ab32c1c70673de6b2
Files
-
f3dcdf72410967db6a1ba81a34b4bf6b835dc5b62255788ab32c1c70673de6b2.exe windows:5 windows x86 arch:x86
1409a44fc293d08f52516ab719784962
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_VECTOR3Length@4
_CrossProduct@12
_WriteTGA@24
_Normalize@8
_SetRotationYMatrix@8
_SetRotationXMatrix@8
_TransformVector3_VPTR2@16
_RotatePositionWithPivot@24
_CalcDistance@8
_MatrixMultiply2@12
_TransformV3TOV4@16
_SetInverseMatrix@8
_COLORtoDWORD@16
wsock32
inet_addr
gethostbyname
WSAStartup
WSACleanup
socket
send
recv
ioctlsocket
htons
connect
closesocket
dinput8
DirectInput8Create
kernel32
SetStdHandle
GetTimeZoneInformation
HeapReAlloc
OutputDebugStringW
FreeEnvironmentStringsW
EncodePointer
DecodePointer
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
CreateFileA
OpenProcess
TerminateProcess
CreateThread
GetLastError
GetThreadContext
ResumeThread
SetEvent
WaitForMultipleObjects
lstrcmpiA
lstrcatA
CreateEventA
GetLogicalDriveStringsA
QueryDosDeviceA
GetPriorityClass
InterlockedCompareExchange
GetModuleHandleA
MulDiv
WriteFile
GetCurrentProcessId
SetEndOfFile
GetStringTypeW
RemoveDirectoryA
VirtualQuery
FindNextFileA
InterlockedExchange
GetCurrentProcess
SetUnhandledExceptionFilter
GetCurrentThreadId
GetModuleFileNameA
GetTempPathA
SetFileAttributesA
CopyFileA
ExitProcess
GetSystemTime
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryW
GetFileAttributesExW
FlushFileBuffers
GetProcessHeap
FindNextFileW
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
RaiseException
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
GetCPInfo
WriteConsoleW
GetModuleFileNameW
SetEnvironmentVariableA
LocalFree
DeleteCriticalSection
FindFirstFileA
CreateFileW
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapFree
HeapAlloc
GetFileType
GetStdHandle
GetCommandLineA
LoadLibraryExW
ExitThread
AreFileApisANSI
GetModuleHandleExW
GetSystemTimeAsFileTime
FindClose
GetVersionExA
user32
SetCapture
wsprintfA
SetRect
MessageBoxA
CharNextA
CharPrevA
OpenClipboard
GetClientRect
LoadCursorFromFileA
SetCursor
LoadIconA
ShowCursor
UpdateWindow
GetSystemMetrics
ShowWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
UnregisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
ReleaseDC
GetDC
OffsetRect
ScreenToClient
GetCursorPos
ReleaseCapture
RegisterHotKey
IsClipboardFormatAvailable
GetClipboardData
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
gdi32
RemoveFontResourceExA
AddFontResourceExA
GetDeviceCaps
SelectObject
GetTextExtentPoint32A
DeleteObject
CreateFontIndirectA
GetStockObject
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
oleaut32
VariantClear
freeimage
_FreeImage_GetInfo@4
_FreeImage_SaveJPEG@12
_FreeImage_Unload@4
_FreeImage_GetBits@4
_FreeImage_Load@12
_FreeImage_ConvertTo16Bits565@4
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 694KB - Virtual size: 937KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ