Static task
static1
Behavioral task
behavioral1
Sample
2d53573c97bd3b925cd94d57c7ee36d8a41353f15f635f6e15bb2b387441addd.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d53573c97bd3b925cd94d57c7ee36d8a41353f15f635f6e15bb2b387441addd.exe
Resource
win10v2004-20240802-en
General
-
Target
2d53573c97bd3b925cd94d57c7ee36d8a41353f15f635f6e15bb2b387441addd
-
Size
2.3MB
-
MD5
86601e047ba26e45c665b3fb1e652cfd
-
SHA1
474034b9cb68954c4106058db832f43feb1cfa0d
-
SHA256
2d53573c97bd3b925cd94d57c7ee36d8a41353f15f635f6e15bb2b387441addd
-
SHA512
763fd5f047bee800c85d0dcc0e47fe88b866904a9ef997f71053d3290336c60f061660a764aa5bb10306f02525eda000d348b661dc79d06d88ea0fb680df13c3
-
SSDEEP
24576:nuPGZWaSPhIlFdQhmqO1Ud6nVlfoeecUglXCsqdqRkMKcP7T:9ZW3PhAFdQhmUd6kclXyfMKcP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d53573c97bd3b925cd94d57c7ee36d8a41353f15f635f6e15bb2b387441addd
Files
-
2d53573c97bd3b925cd94d57c7ee36d8a41353f15f635f6e15bb2b387441addd.exe windows:5 windows x86 arch:x86
cd8051835a5994b6f28a7d96faaaef9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_VECTOR3Length@4
_COLORtoDWORD@16
_TransformV3TOV4@16
_SetInverseMatrix@8
_Normalize@8
_CrossProduct@12
_MatrixMultiply2@12
_CalcDistance@8
_RotatePositionWithPivot@24
_TransformVector3_VPTR2@16
_SetRotationXMatrix@8
_SetRotationYMatrix@8
_WriteTGA@24
wsock32
inet_addr
ioctlsocket
WSACleanup
WSAStartup
gethostbyname
dinput8
DirectInput8Create
kernel32
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
CreateFileA
OpenProcess
GetSystemTimeAsFileTime
CreateThread
GetLastError
GetThreadContext
ResumeThread
SetEvent
WaitForMultipleObjects
lstrcmpiA
lstrcatA
CreateEventA
GetLogicalDriveStringsA
QueryDosDeviceA
GetPriorityClass
WriteFile
SetFilePointer
InterlockedCompareExchange
GetModuleHandleA
MulDiv
GetCurrentProcessId
WaitForSingleObject
InterlockedExchange
GetCurrentThreadId
GetVersionExA
GetSystemTime
InterlockedDecrement
DeviceIoControl
LoadLibraryExW
RaiseException
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
GetModuleFileNameW
LocalFree
user32
LoadCursorFromFileA
SetCursor
LoadIconA
ShowCursor
UpdateWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
RegisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
ReleaseDC
GetDC
OffsetRect
ScreenToClient
GetCursorPos
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
GetClipboardData
IsDialogMessageA
ClientToScreen
GetWindowRect
GetClientRect
GetSystemMetrics
EnableWindow
SetFocus
SendDlgItemMessageA
CheckRadioButton
CheckDlgButton
GetDlgItemTextA
SetDlgItemTextA
GetDlgItemInt
SetDlgItemInt
GetDlgItem
CreateDialogParamA
SetWindowPos
AnimateWindow
ShowWindow
DestroyWindow
IsWindow
SendMessageA
EnumWindows
GetWindowTextA
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharPrevA
CharNextA
MessageBoxA
SetRect
wsprintfA
SetWindowTextA
gdi32
DeleteObject
GetTextExtentPoint32A
SelectObject
GetDeviceCaps
AddFontResourceExA
RemoveFontResourceExA
GetStockObject
CreateFontIndirectA
comdlg32
GetOpenFileNameA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
shell32
ShellExecuteA
ole32
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
freeimage
_FreeImage_GetInfo@4
_FreeImage_GetBits@4
_FreeImage_Load@12
_FreeImage_SaveJPEG@12
_FreeImage_ConvertTo16Bits565@4
_FreeImage_Unload@4
msvcp120
?_Swap_all@_Container_base12@std@@QAEXAAU12@@Z
?_Orphan_all@_Container_base12@std@@QAEXXZ
??1_Container_base12@std@@QAE@XZ
??0_Container_base12@std@@QAE@XZ
?_Orphan_all@_Container_base0@std@@QAEXXZ
?_Winerror_map@std@@YAPBDH@Z
?_Syserror_map@std@@YAPBDH@Z
??0id@locale@std@@QAE@I@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
msvcr120
fputs
_atoi64
_i64toa
_vsnprintf
malloc
free
_mbsnbicmp
toupper
_CIatan2
atof
strtok
strncat
sscanf
strncmp
memchr
fopen_s
printf
strstr
atol
srand
_time64
_libm_sse2_tan_precise
fgetc
_itoa
feof
fgets
ftell
isalpha
strcpy_s
exit
sprintf_s
_wassert
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except1
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
_except_handler4_common
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
_exit
_cexit
_ismbblead
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
_acmdln
_fmode
_commode
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
strcpy
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
_CxxThrowException
__CxxFrameHandler3
memcpy
_libm_sse2_cos_precise
_libm_sse2_sin_precise
??_V@YAXPAX@Z
memset
strncpy
fclose
fopen
fprintf
rand
sprintf
fread
fseek
fwrite
atoi
vsprintf
_libm_sse2_sqrt_precise
memcmp
_strupr
fscanf
iphlpapi
GetAdaptersInfo
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 656KB - Virtual size: 947KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ