Static task
static1
Behavioral task
behavioral1
Sample
TTD-Trade-Scam-Hack_39779.exe
Resource
win11-20240611-en
General
-
Target
TTD-Trade-Scam-Hack_39779.exe
-
Size
18.6MB
-
MD5
90956973a7820cb2c6137244c1afef6c
-
SHA1
e85a0521066eeef1eb7994770da0dc2100ef08a7
-
SHA256
3e897b4c13c7ad1df79d2502150c1fce15c7997bffe440b1467d856f99b57264
-
SHA512
34d9f850830c88458362020cafc5c31712e5e2fc3a6d7faa0530f1f27ae204352261fad589c4e8dd75519da8f1ef7f37643705583a8bad63c3e3667a7e6ed0aa
-
SSDEEP
393216:WRH+IlltiY1ttCPPDu0fXwUIM3/a4qID3QYDez3QzCQSPIaXSz69II65rUVG:WRH+IlcPPDu0fXwUIM3/a4q83ivhdS+u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource TTD-Trade-Scam-Hack_39779.exe
Files
-
TTD-Trade-Scam-Hack_39779.exe.exe windows:6 windows x86 arch:x86
b74de93f4bb61028367b713c007a0721
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
kernel32
FindFirstFileExA
AcquireSRWLockExclusive
ReadFile
GetSystemInfo
GetCPInfo
CompareStringW
GetFileAttributesA
VerSetConditionMask
LoadLibraryA
DecodePointer
GetTempPathW
GetModuleFileNameW
GetTickCount64
FreeLibrary
GetCurrentProcess
FreeEnvironmentStringsW
LocalFree
MultiByteToWideChar
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
GetFileSizeEx
LCMapStringEx
LCMapStringW
GetTempPathA
lstrlenA
GetEnvironmentStringsW
CreateDirectoryA
WaitForSingleObject
DeleteFileA
FileTimeToSystemTime
WakeAllConditionVariable
IsProcessorFeaturePresent
GetUserDefaultLCID
CreateDirectoryW
FindFirstFileA
FindFirstFileW
GetVersion
FindNextFileW
SetEnvironmentVariableA
VerifyVersionInfoW
CreateFileW
WriteFile
EncodePointer
FormatMessageA
HeapFree
SetFileTime
RemoveDirectoryW
GetCurrentDirectoryW
SetLastError
ReleaseSRWLockExclusive
GetProcessAffinityMask
GetStartupInfoW
GetEnvironmentVariableA
CreateEventA
GetCurrentThreadId
RtlUnwind
GetStdHandle
RemoveDirectoryA
GetModuleFileNameA
GetModuleHandleW
GetTickCount
GetVersionExA
SetEvent
GetOEMCP
GetFileInformationByHandle
GetFileSize
GetCommandLineA
GetFileAttributesExW
PeekNamedPipe
GetDateFormatW
CreateThread
QueryPerformanceFrequency
GetFinalPathNameByHandleW
GetStringTypeW
GetTimeZoneInformation
TlsSetValue
GetCurrentDirectoryA
InitializeCriticalSectionEx
CreateSemaphoreA
FlushFileBuffers
HeapAlloc
TlsAlloc
FindClose
GetFileType
WaitForSingleObjectEx
GetTimeFormatW
HeapReAlloc
SetFilePointerEx
VirtualFree
IsValidCodePage
GetProcAddress
TlsGetValue
GetLastError
GetProcessHeap
FormatMessageW
SetCurrentDirectoryW
ExitProcess
lstrcatA
GlobalMemoryStatus
ReadConsoleW
WideCharToMultiByte
TryAcquireSRWLockExclusive
SetStdHandle
EnumSystemLocalesW
DeleteCriticalSection
IsDebuggerPresent
MoveFileExW
GetLocaleInfoEx
SetEndOfFile
EnterCriticalSection
SetFileAttributesA
GetFileAttributesW
SetCurrentDirectoryA
DeleteFileW
GetACP
Sleep
AreFileApisANSI
InitializeCriticalSection
TlsFree
WriteConsoleW
SetFilePointer
LoadLibraryW
CloseHandle
LeaveCriticalSection
WaitForMultipleObjects
CreateFileA
InitializeCriticalSectionAndSpinCount
SetFileAttributesW
GetDriveTypeW
FindNextFileA
GetConsoleMode
VirtualAlloc
QueryPerformanceCounter
FreeLibraryAndExitThread
SetUnhandledExceptionFilter
GetConsoleCP
UnhandledExceptionFilter
GetCommandLineW
GetLocaleInfoW
RaiseException
ResetEvent
IsValidLocale
ReleaseSemaphore
TerminateProcess
LoadLibraryExW
SleepEx
GetModuleHandleA
HeapSize
GetSystemDirectoryW
GetFullPathNameW
InitializeSListHead
GetModuleHandleExW
ExitThread
GetCurrentProcessId
user32
PostMessageA
SetWindowTextW
LoadStringW
MessageBoxA
GetWindowLongA
DestroyWindow
LoadStringA
DialogBoxParamW
SendMessageA
SetTimer
CharUpperA
GetDlgItem
SetWindowLongA
EndDialog
KillTimer
SetWindowTextA
wsprintfA
MessageBoxW
DialogBoxParamA
CharUpperW
ShowWindow
LoadIconA
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
bcrypt
BCryptGenRandom
advapi32
CryptImportKey
CryptGetHashParam
CryptEncrypt
CryptReleaseContext
CryptCreateHash
CryptDestroyKey
CryptAcquireContextW
CryptDestroyHash
CryptHashData
crypt32
CryptStringToBinaryW
CertFreeCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CryptDecodeObjectEx
CertFindExtension
CertGetNameStringW
CertCloseStore
CertCreateCertificateChainEngine
CertEnumCertificatesInStore
CertFindCertificateInStore
CertOpenStore
PFXImportCertStore
CertFreeCertificateChainEngine
CryptQueryObject
CertAddCertificateContextToStore
wldap32
ord216
ord301
ord145
ord219
ord46
ord14
ord147
ord73
ord208
ord41
ord117
ord26
ord27
ord127
ord167
ord142
ord79
ord133
ws2_32
gethostname
htons
getsockopt
send
getaddrinfo
WSACreateEvent
WSAIoctl
WSAEnumNetworkEvents
WSAResetEvent
WSAEventSelect
closesocket
WSAGetLastError
ntohs
WSASetLastError
WSAStartup
WSACleanup
ioctlsocket
setsockopt
freeaddrinfo
__WSAFDIsSet
select
accept
bind
connect
getsockname
htonl
listen
recv
socket
WSAWaitForMultipleEvents
WSACloseEvent
recvfrom
sendto
getpeername
Sections
.text Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ