Static task
static1
Behavioral task
behavioral1
Sample
51a649f1c79934c0f1c9568cc0a2e320ab3b314bb243ac7a6b61cf90f6c45471.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
51a649f1c79934c0f1c9568cc0a2e320ab3b314bb243ac7a6b61cf90f6c45471.exe
Resource
win10v2004-20240802-en
General
-
Target
51a649f1c79934c0f1c9568cc0a2e320ab3b314bb243ac7a6b61cf90f6c45471
-
Size
6.6MB
-
MD5
970b90b36f2c5083d37bc7cf774c789f
-
SHA1
45778c19cfad75a99b0e654a2e2736ebb03dbf0f
-
SHA256
51a649f1c79934c0f1c9568cc0a2e320ab3b314bb243ac7a6b61cf90f6c45471
-
SHA512
b7ca037ee71a15d93fe274b77853cc68419245e14257cbd20ae9c39600fa4e7cb923e1545b5a59f7e1418fbb98b0297e27e5260a5b0c79e0b92e3d642b650b01
-
SSDEEP
196608:OsiwdfQYm9idV0U7mSiOxvLNQLI5o6ou5Xyo9y:OsiwdfQYm9+V0U7mSjNLN2I5o6ou5Xh9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51a649f1c79934c0f1c9568cc0a2e320ab3b314bb243ac7a6b61cf90f6c45471
Files
-
51a649f1c79934c0f1c9568cc0a2e320ab3b314bb243ac7a6b61cf90f6c45471.exe windows:5 windows x86 arch:x86
80a266b608d55b7053b3f66d01eb7deb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_SetInverseMatrix@8
_TransformV3TOV4@16
_MatrixMultiply2@12
_COLORtoDWORD@16
_VECTOR3Length@4
_RotatePositionWithPivot@24
_WriteTGA@24
_Normalize@8
_SetRotationYMatrix@8
_SetRotationXMatrix@8
_TransformVector3_VPTR2@16
_CrossProduct@12
_CalcDistance@8
wsock32
WSACleanup
inet_addr
gethostbyname
ioctlsocket
WSAStartup
dinput8
DirectInput8Create
kernel32
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
CreateFileA
GetLastError
ResumeThread
WaitForSingleObject
lstrcmpiA
WriteFile
SetFilePointer
CreateDirectoryA
InterlockedCompareExchange
GetModuleHandleA
MulDiv
VerSetConditionMask
OpenProcess
GetCurrentProcess
GetCurrentProcessId
ExitProcess
CreateThread
GetProcessId
DuplicateHandle
lstrcatA
GetLogicalDriveStringsA
QueryDosDeviceA
VerifyVersionInfoA
WriteProcessMemory
InterlockedExchange
VirtualQuery
TerminateProcess
ReadConsoleW
GetACP
TerminateThread
SetUnhandledExceptionFilter
GetCurrentThreadId
GetModuleFileNameA
GetVersionExA
GetSystemTime
InterlockedDecrement
DeviceIoControl
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
GetCPInfo
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
GetCommandLineA
LoadLibraryExW
AreFileApisANSI
GetModuleHandleExW
HeapReAlloc
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
RaiseException
GetStringTypeW
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
SetFilePointerEx
GetOEMCP
GetProcessHeap
FlushFileBuffers
GetTimeZoneInformation
LocalFree
SetEndOfFile
SetEnvironmentVariableA
GetFileAttributesExW
CreateFileW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetStdHandle
CreateProcessA
GetExitCodeProcess
user32
CreateWindowExA
RegisterClassExA
DefWindowProcA
RegisterHotKey
ShowCursor
FindWindowA
PeekMessageA
DispatchMessageA
TranslateMessage
ReleaseDC
GetDC
ScreenToClient
GetCursorPos
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
GetClipboardData
IsDialogMessageA
ClientToScreen
GetClientRect
SetWindowTextA
GetSystemMetrics
EnableWindow
SetFocus
SendDlgItemMessageA
CheckRadioButton
CheckDlgButton
SetDlgItemTextA
GetDlgItemInt
SetDlgItemInt
GetDlgItem
CreateDialogParamA
SetWindowPos
AnimateWindow
ShowWindow
DestroyWindow
IsWindow
SendMessageA
OffsetRect
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharPrevA
CharNextA
MessageBoxA
SetRect
wsprintfA
LoadIconA
PostQuitMessage
GetWindowThreadProcessId
SetCursor
LoadCursorFromFileA
GetDlgItemTextA
UpdateWindow
GetWindowTextA
GetWindowRect
gdi32
DeleteObject
GetTextExtentPoint32A
SelectObject
GetStockObject
GetDeviceCaps
CreateFontIndirectA
comdlg32
GetOpenFileNameA
advapi32
GetUserNameA
RegCloseKey
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoSetProxyBlanket
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
CoInitializeEx
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
freeimage
_FreeImage_GetInfo@4
_FreeImage_ConvertTo16Bits565@4
_FreeImage_SaveJPEG@12
_FreeImage_Load@12
_FreeImage_Unload@4
_FreeImage_GetBits@4
iphlpapi
GetAdaptersInfo
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.4MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�'C)�u Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE