Static task
static1
Behavioral task
behavioral1
Sample
d3b65f8cc7f76bbdccaea142c1d1401d7a799609dbc83fb252c1cc01d3e27ff3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d3b65f8cc7f76bbdccaea142c1d1401d7a799609dbc83fb252c1cc01d3e27ff3.exe
Resource
win10v2004-20240730-en
General
-
Target
d3b65f8cc7f76bbdccaea142c1d1401d7a799609dbc83fb252c1cc01d3e27ff3
-
Size
220KB
-
MD5
41aa90bd1bd89409a9a5b154a2b98598
-
SHA1
ece78f70a895ba9b4e5135e973e63ab2a4b94712
-
SHA256
d3b65f8cc7f76bbdccaea142c1d1401d7a799609dbc83fb252c1cc01d3e27ff3
-
SHA512
4576bddbe82f5c61757a8e87662f4b1873ef95ea748fcfc1a13768b8535884679f91acadb56d7df970d1cf2c3489b0c81eed855cd2d987d7afedd0c4607b771c
-
SSDEEP
6144:z0YpakKuRhOwoPzlcmDs2U03RHzUbVaU3JE:YPkKMwxJUYU5Zi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3b65f8cc7f76bbdccaea142c1d1401d7a799609dbc83fb252c1cc01d3e27ff3
Files
-
d3b65f8cc7f76bbdccaea142c1d1401d7a799609dbc83fb252c1cc01d3e27ff3.exe windows:4 windows x86 arch:x86
2140a1daad6e5cef24fb5918559edacb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nstrc
ord4
ord7
fmteng
FMT_PERCENT
FMT_ENGINE
mfc42
ord800
ord537
ord860
ord540
ord324
ord825
ord858
ord2302
ord2370
ord4234
ord6199
ord4710
ord319
ord3499
ord2515
ord355
ord1200
ord2301
ord1779
ord2642
ord2818
ord2379
ord4123
ord4129
ord3876
ord3874
ord2645
ord5572
ord2915
ord924
ord941
ord665
ord1979
ord5186
ord1783
ord3790
ord6334
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord6055
ord1776
ord4401
ord5290
ord4424
ord3639
ord567
ord692
ord4275
ord4683
ord2864
ord3089
ord3610
ord656
ord2575
ord4396
ord3402
ord3574
ord5981
ord354
ord3721
ord795
ord535
ord3663
ord823
ord922
ord5710
ord5683
ord641
ord2764
ord3723
ord3698
ord765
ord797
ord1146
ord1168
ord4220
ord2584
ord3654
ord2438
ord1175
ord2863
ord5953
ord1768
ord755
ord470
ord1105
ord2652
ord1669
ord2118
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord3798
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord4159
ord2621
ord3922
ord2725
ord2763
ord6283
ord1567
ord268
ord6467
ord939
ord668
ord2770
ord356
ord6222
ord6215
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord2586
ord4405
ord609
ord2614
ord4079
ord269
ord826
ord600
ord1578
ord1243
ord1176
ord1576
msvcrt
__setusermatherr
_initterm
__p__fmode
__set_app_type
__getmainargs
_XcptFilter
_acmdln
exit
??1type_info@@UAE@XZ
_exit
_adjust_fdiv
?terminate@@YAXXZ
__p__commode
__dllonexit
_except_handler3
_onexit
_controlfp
_EH_prolog
_findfirst
_findclose
_mbsicmp
strtok
strncpy
malloc
free
_mbscmp
sscanf
sprintf
__CxxFrameHandler
_setmbcp
_stricmp
kernel32
FormatMessageA
GetCurrentProcess
LocalAlloc
CreateEventA
LocalFree
FindFirstFileA
FindClose
GetVersionExA
lstrcpyA
GetLastError
CreateFileA
CreateDirectoryExA
CloseHandle
DeleteFileA
LoadLibraryA
GetProcAddress
FreeLibrary
SetEvent
lstrcatA
lstrlenA
Sleep
lstrcmpA
GetACP
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetUserDefaultLangID
CopyFileA
ResumeThread
GetModuleHandleA
GetStartupInfoA
ResetEvent
OutputDebugStringA
user32
ShowWindow
SetForegroundWindow
SetRectEmpty
GetWindowTextA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetKeyState
GetMenu
EnumWindows
ModifyMenuA
EnableMenuItem
SetMenu
LoadIconA
DefDlgProcA
LoadCursorA
RegisterClassA
LoadStringA
GetParent
SendMessageA
EnableWindow
GetSystemMenu
AppendMenuA
WinHelpA
advapi32
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
GetTokenInformation
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
msvcirt
_mtunlock
_mtlock
??_Dfstream@@QAEXXZ
?get@istream@@IAEAAV1@PADHH@Z
??1fstream@@UAE@XZ
?close@fstream@@QAEXXZ
??1ios@@UAE@XZ
??0fstream@@QAE@PBDHH@Z
?openprot@filebuf@@2HB
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE