Static task
static1
Behavioral task
behavioral1
Sample
84ae980f90cc07fb80db35732cde23779a06bbf18e725b96d3726f302d12b60a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
84ae980f90cc07fb80db35732cde23779a06bbf18e725b96d3726f302d12b60a.exe
Resource
win10v2004-20240802-en
General
-
Target
84ae980f90cc07fb80db35732cde23779a06bbf18e725b96d3726f302d12b60a
-
Size
4.0MB
-
MD5
cdced8b62d4ca9c7681b7e5a672a8c86
-
SHA1
61c2d4b956eb671f19f3d44e7d155ceaf397e899
-
SHA256
84ae980f90cc07fb80db35732cde23779a06bbf18e725b96d3726f302d12b60a
-
SHA512
d882d464e85a1438067ec4f7c4d52b8c1bade5458bb103369a23199b243e859118770d5f809400f7d2b8b81d1557853f283f38559d2a2065294ea9c0989b7c97
-
SSDEEP
98304:nIWmNPcMAKFsAPSaZZSPnNmm3myZOq/POFaiTqP+509sTYx+Xu+tFmDnmV5ufvuj:nIWmNPcMAKFsAPSaZZSPnNmm3myZOq/w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84ae980f90cc07fb80db35732cde23779a06bbf18e725b96d3726f302d12b60a
Files
-
84ae980f90cc07fb80db35732cde23779a06bbf18e725b96d3726f302d12b60a.exe windows:5 windows x86 arch:x86
7fcee12eb015dada4c1d8e837a6c9020
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_CalcDistance@8
_COLORtoDWORD@16
_TransformV3TOV4@16
_SetInverseMatrix@8
_TransformVector3_VPTR2@16
_MatrixMultiply2@12
_CrossProduct@12
_Normalize@8
_VECTOR3Length@4
_WriteTGA@24
_RotatePositionWithPivot@24
_SetRotationXMatrix@8
_SetRotationYMatrix@8
wsock32
WSACleanup
setsockopt
socket
ioctlsocket
gethostbyname
sendto
recvfrom
inet_addr
WSAStartup
gethostbyaddr
dinput8
DirectInput8Create
wininet
InternetConnectA
InternetReadFile
InternetQueryDataAvailable
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpOpenRequestA
kernel32
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
HeapReAlloc
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FatalAppExitA
IsValidCodePage
GetOEMCP
GetACP
SetFilePointer
CreateDirectoryA
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
FindFirstFileA
CloseHandle
FileTimeToSystemTime
GetCurrentDirectoryA
GetWindowsDirectoryA
InitializeCriticalSection
SetUnhandledExceptionFilter
DeleteCriticalSection
GetCurrentProcess
GetLastError
GetCurrentThread
TerminateProcess
LeaveCriticalSection
GetCurrentProcessId
EnterCriticalSection
GetCurrentThreadId
CreateFileA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetTickCount
Sleep
GlobalUnlock
GlobalLock
GlobalAlloc
GetLocalTime
lstrcmpiA
lstrcpyA
IsDBCSLeadByte
lstrlenA
SetStdHandle
OutputDebugStringA
InterlockedCompareExchange
Process32Next
Process32First
CreateToolhelp32Snapshot
ReadFile
WriteFile
GlobalFree
GetSystemTime
LCMapStringA
EnumSystemLocalesA
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
FreeLibrary
GetVersionExA
GetFileSize
GetSystemDefaultLangID
GetModuleHandleA
OpenFile
lstrcmpA
InterlockedExchange
CreateThread
SetCurrentDirectoryA
GetTimeZoneInformation
HeapDestroy
HeapCreate
GetLocaleInfoW
LoadLibraryW
SetConsoleCtrlHandler
SetHandleCount
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
ExitProcess
GetModuleHandleW
HeapSize
IsDebuggerPresent
FlushFileBuffers
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
ExitThread
HeapAlloc
HeapFree
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
GetProcessHeap
VirtualQuery
CreateFileW
WideCharToMultiByte
IsValidLocale
SetEndOfFile
CompareStringW
MulDiv
SetEnvironmentVariableA
user32
DefWindowProcA
CallNextHookEx
ShowWindow
IsWindowVisible
GetAsyncKeyState
SetCapture
ReleaseCapture
GetCursorPos
ScreenToClient
IsClipboardFormatAvailable
GetClipboardData
GetActiveWindow
CharPrevA
CharNextA
GetDC
ReleaseDC
OffsetRect
SetCursor
LoadCursorFromFileA
CopyRect
GetClientRect
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SendMessageA
SetRect
MessageBoxA
PeekMessageA
DispatchMessageA
TranslateMessage
LoadIconA
RegisterClassExA
PostMessageA
GetSystemMetrics
CreateWindowExA
UpdateWindow
ShowCursor
EndDialog
wsprintfA
UnhookWindowsHookEx
SetWindowsHookExA
gdi32
GetTextExtentPoint32A
SelectObject
GetDeviceCaps
GetStockObject
CreateFontIndirectA
DeleteObject
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
OpenThreadToken
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoFreeUnusedLibraries
CoInitialize
freeimage
_FreeImage_GetBits@4
_FreeImage_SaveJPEG@12
_FreeImage_GetInfo@4
_FreeImage_ConvertTo16Bits565@4
_FreeImage_Unload@4
_FreeImage_Load@12
iphlpapi
GetAdaptersInfo
shlwapi
StrStrIA
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ