Static task
static1
Behavioral task
behavioral1
Sample
3c419270b568b12227e56010977950c7e015eeb65692f4614bc80df809b28f67.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3c419270b568b12227e56010977950c7e015eeb65692f4614bc80df809b28f67.exe
Resource
win10v2004-20240611-en
General
-
Target
3c419270b568b12227e56010977950c7e015eeb65692f4614bc80df809b28f67
-
Size
1.2MB
-
MD5
fbccf2207763507e95e8c80de7614db6
-
SHA1
d0dfcabde3a635de2a43718c3ffa31c0cd8db037
-
SHA256
3c419270b568b12227e56010977950c7e015eeb65692f4614bc80df809b28f67
-
SHA512
4583545914471154a4361200df27bb6ce0da4160055d139ab378d4b0d996f3a50f8d6805302094a89dfa6b5903d5186a529b7914fcc85943e185d254d5a1ecba
-
SSDEEP
24576:2wQIUwtpeALHcJZpacPn+Bt8J5I8aVx9FC741Dn7PYKgpVr:vIwLiUBt8TKo74dngVr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c419270b568b12227e56010977950c7e015eeb65692f4614bc80df809b28f67
Files
-
3c419270b568b12227e56010977950c7e015eeb65692f4614bc80df809b28f67.exe windows:5 windows x86 arch:x86
a4786a134f3449bf7d557e10edf16db3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
GetFileAttributesW
CreateDirectoryW
GetLocalTime
SetEndOfFile
GetStdHandle
GetFileType
GetCurrentThreadId
GetModuleHandleA
QueryPerformanceCounter
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
InterlockedDecrement
InterlockedIncrement
DuplicateHandle
EnterCriticalSection
LeaveCriticalSection
ExpandEnvironmentStringsW
CreateEventW
WaitForMultipleObjects
InterlockedCompareExchange
OutputDebugStringW
InitializeCriticalSection
InterlockedExchange
FlushFileBuffers
IsDebuggerPresent
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
GetConsoleCP
ReadConsoleW
SetFilePointerEx
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LoadLibraryExW
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
AreFileApisANSI
GetModuleHandleExW
ExitProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
SetLastError
DecodePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStartupInfoW
LocalFree
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
GetSystemDirectoryW
FreeLibrary
Sleep
LoadLibraryW
GetModuleFileNameW
WTSGetActiveConsoleSessionId
GetCurrentProcessId
Process32NextW
GetStringTypeW
EncodePointer
GetOEMCP
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
SetFilePointer
WriteFile
ReadFile
GetProcAddress
CreateFileW
GetModuleHandleW
SetDllDirectoryW
GetCommandLineW
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetEvent
user32
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
CallWindowProcW
CreateWindowExW
IsWindow
DestroyWindow
GetWindowLongW
SetWindowLongW
GetWindowThreadProcessId
FindWindowA
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
SendMessageTimeoutW
advapi32
CheckTokenMembership
AllocateAndInitializeSid
FreeSid
ImpersonateLoggedOnUser
RevertToSelf
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
shell32
CommandLineToArgvW
ShellExecuteW
shlwapi
PathAppendW
PathAddBackslashW
PathFindFileNameW
wtsapi32
WTSQueryUserToken
Sections
.text Size: 784KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ