Static task
static1
Behavioral task
behavioral1
Sample
97586a8f820cfc01347ef24e5f48f26ea9dbffac52325ce377b9d954de6a74de.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
97586a8f820cfc01347ef24e5f48f26ea9dbffac52325ce377b9d954de6a74de.exe
Resource
win10v2004-20240802-en
General
-
Target
97586a8f820cfc01347ef24e5f48f26ea9dbffac52325ce377b9d954de6a74de
-
Size
2.9MB
-
MD5
5bd2c2eabc1fc4cb38805fddc894cd73
-
SHA1
469acdd1ed91163d59eb3a913c25839f7e63642e
-
SHA256
97586a8f820cfc01347ef24e5f48f26ea9dbffac52325ce377b9d954de6a74de
-
SHA512
9f0fc638bc2832d3eff7c5dc1c523de27b6a3289d410930c909d0bbd08fa905962f8aa6c9855152e45dcad849934b68fb23b159b5c7d750579c9c9c7e8692910
-
SSDEEP
49152:b05BWrzMKu5yNbqGqfpr98U+Aca79spuuOuM6AbClxHEL7DzKYRB1fRXtpPiC1Iq:bgWrzCGCpr98U6AbClxH0NRXtmImxJhj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97586a8f820cfc01347ef24e5f48f26ea9dbffac52325ce377b9d954de6a74de
Files
-
97586a8f820cfc01347ef24e5f48f26ea9dbffac52325ce377b9d954de6a74de.exe windows:5 windows x86 arch:x86
7d8437615ac559d085e45824587cc141
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_VECTOR3Length@4
_CrossProduct@12
_WriteTGA@24
_Normalize@8
_SetRotationYMatrix@8
_SetRotationXMatrix@8
_TransformVector3_VPTR2@16
_RotatePositionWithPivot@24
_CalcDistance@8
_MatrixMultiply2@12
_TransformV3TOV4@16
_SetInverseMatrix@8
_COLORtoDWORD@16
wsock32
inet_addr
gethostbyname
WSAStartup
WSACleanup
socket
send
recv
ioctlsocket
htons
connect
closesocket
dinput8
DirectInput8Create
kernel32
FreeEnvironmentStringsW
OutputDebugStringW
EncodePointer
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
CreateFileA
GetLastError
lstrcmpiA
InterlockedCompareExchange
GetModuleHandleA
MulDiv
WriteFile
OpenProcess
GetCurrentProcessId
WaitForSingleObject
FindClose
RemoveDirectoryA
FindFirstFileA
FindNextFileA
InterlockedExchange
CreateThread
GetCurrentProcess
TerminateProcess
HeapReAlloc
DecodePointer
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetModuleFileNameA
lstrcatA
GetLogicalDriveStringsA
GetTempPathA
QueryDosDeviceA
SetFileAttributesA
CopyFileA
GetVersionExA
GetSystemTime
ExitThread
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryW
GetFileAttributesExW
FlushFileBuffers
GetProcessHeap
FindNextFileW
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
GetStringTypeW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
GetCPInfo
GetTimeZoneInformation
SetStdHandle
VirtualQuery
CreateFileW
SetEndOfFile
SetEnvironmentVariableA
LocalFree
SetUnhandledExceptionFilter
RtlUnwind
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
GetCommandLineA
LoadLibraryExW
AreFileApisANSI
user32
SetCapture
wsprintfA
SetRect
MessageBoxA
CharNextA
CharPrevA
OpenClipboard
GetClientRect
LoadCursorFromFileA
SetCursor
LoadIconA
ShowCursor
UpdateWindow
GetSystemMetrics
ShowWindow
RegisterClassExA
DefWindowProcA
RegisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
ReleaseDC
GetDC
ScreenToClient
GetCursorPos
ReleaseCapture
CreateWindowExA
IsClipboardFormatAvailable
GetClipboardData
OffsetRect
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
gdi32
GetStockObject
RemoveFontResourceExA
AddFontResourceExA
GetDeviceCaps
SelectObject
GetTextExtentPoint32A
DeleteObject
CreateFontIndirectA
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
oleaut32
VariantClear
freeimage
_FreeImage_GetInfo@4
_FreeImage_SaveJPEG@12
_FreeImage_Unload@4
_FreeImage_GetBits@4
_FreeImage_Load@12
_FreeImage_ConvertTo16Bits565@4
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 230KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 695KB - Virtual size: 932KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�*��u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE