Static task
static1
Behavioral task
behavioral1
Sample
3d1c1a24344531cc731e6cb0f4c18e9df12db869ffda16602950f0bf3ffe63bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d1c1a24344531cc731e6cb0f4c18e9df12db869ffda16602950f0bf3ffe63bb.exe
Resource
win10v2004-20240802-en
General
-
Target
3d1c1a24344531cc731e6cb0f4c18e9df12db869ffda16602950f0bf3ffe63bb
-
Size
5.2MB
-
MD5
03d071f270d80747792c180dea39b918
-
SHA1
6af69d6372f9ea85c16dbb14061cdb5110f36928
-
SHA256
3d1c1a24344531cc731e6cb0f4c18e9df12db869ffda16602950f0bf3ffe63bb
-
SHA512
57f4faf3bbc7f776bdce54a8182d7f68ee1a7e108e17cd86953c4099e11855d55492fa9eda12258a0baa6f4f202635e26517f3ed080ec1c3c78b01587d44409d
-
SSDEEP
98304:HMvTztYjE+S2qBYyllzmWWssXl5B0sJF7oBPB1qlp8v8CNQ9tSX:HMbRYIP7Xll6Fss15B0s77MI9X9oX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d1c1a24344531cc731e6cb0f4c18e9df12db869ffda16602950f0bf3ffe63bb
Files
-
3d1c1a24344531cc731e6cb0f4c18e9df12db869ffda16602950f0bf3ffe63bb.exe windows:5 windows x86 arch:x86
2cad06f0722f77ad0c4151f286bd108a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_DEBUG_STRIPPED
Imports
winmm
timeGetTime
msvcrt
__set_app_type
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_controlfp
__p__fmode
comctl32
ImageList_GetDragImage
ord17
ImageList_Write
ImageList_DragLeave
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragMove
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Read
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_SetIconSize
version
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalHandle
GlobalLock
GetWindowsDirectoryA
GlobalSize
GlobalUnlock
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
MapViewOfFile
MoveFileA
MulDiv
MultiByteToWideChar
OpenMutexA
OpenProcess
QueryPerformanceFrequency
RaiseException
ReadFile
RemoveDirectoryA
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetThreadLocale
SetThreadPriority
SizeofResource
Sleep
TerminateProcess
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
WritePrivateProfileStringA
GetVersionExA
GetVersion
GetUserDefaultLCID
GetTimeZoneInformation
GetThreadLocale
GetTempPathA
GetSystemInfo
GetSystemDirectoryA
GetStringTypeExA
GetStartupInfoA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsA
GetLocalTime
GetLocaleInfoA
GetFullPathNameA
GetFileType
GetFileTime
GetFileAttributesA
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetDateFormatA
GetCPInfo
GetComputerNameA
GetACP
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnumCalendarInfoA
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
IsValidCodePage
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
FindResourceW
GetLastError
GetFileSize
FreeResource
GetStdHandle
GlobalReAlloc
user32
LoadIconA
LoadKeyboardLayoutA
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
OemToCharA
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WaitMessage
WindowFromPoint
WinHelpA
IsZoomed
IsWindowVisible
IsWindowEnabled
IsRectEmpty
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
LoadCursorA
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetMessageTime
GetMessagePos
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardState
GetKeyboardLayoutList
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItem
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
CloseClipboard
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CharUpperBuffA
CharToOemA
CharNextA
CharLowerBuffA
CharLowerA
CallWindowProcA
LoadBitmapA
GetWindowPlacement
KillTimer
CallNextHookEx
BeginPaint
GetKeyboardType
GetCapture
GetIconInfo
gdi32
ExcludeClipRect
DeleteObject
ExtTextOutA
GdiFlush
GetBitmapBits
GetBrushOrgEx
GetEnhMetaFilePaletteEntries
GetObjectA
GetObjectType
GetPaletteEntries
GetPixel
GetStockObject
GetSystemPaletteEntries
GetTextExtentPoint32A
GetTextExtentPointA
DeleteEnhMetaFile
GetTextMetricsA
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
LPtoDP
MaskBlt
MoveToEx
PatBlt
PlayEnhMetaFile
Polyline
GetEnhMetaFileBits
RealizePalette
Rectangle
RectVisible
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetMapMode
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StretchBlt
UnrealizeObject
GetDIBits
GetDIBColorTable
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateEnhMetaFileA
CreateDIBSection
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
GetEnhMetaFileDescriptionA
CopyEnhMetaFileA
GetDeviceCaps
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetEnhMetaFileHeader
comdlg32
GetSaveFileNameA
advapi32
RegFlushKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
OpenServiceA
OpenSCManagerA
GetUserNameA
DeleteService
ControlService
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
OleInitialize
OleDraw
IsAccelerator
CreateStreamOnHGlobal
OleSetMenuDescriptor
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoGetClassObject
OleUninitialize
StringFromCLSID
CoUninitialize
ProgIDFromCLSID
oleaut32
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SysReAllocStringLen
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysFreeString
SysAllocStringLen
GetErrorInfo
SafeArrayCreate
ws2_32
closesocket
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls20 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fu115 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE