Static task
static1
Behavioral task
behavioral1
Sample
641bf19394a57bd2c96767c7e05ffad3a2fd595fe27655aa268111352ebe1064.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
641bf19394a57bd2c96767c7e05ffad3a2fd595fe27655aa268111352ebe1064.exe
Resource
win10v2004-20240802-en
General
-
Target
641bf19394a57bd2c96767c7e05ffad3a2fd595fe27655aa268111352ebe1064
-
Size
4.0MB
-
MD5
953d2e08253747bde28c353798e8879a
-
SHA1
c6ef255f1e2315d2aed4aa3c10c6ada1d09f3809
-
SHA256
641bf19394a57bd2c96767c7e05ffad3a2fd595fe27655aa268111352ebe1064
-
SHA512
93fa27939d12405198a132cd548ba8efbfc6f4770aee733b59125429a8d51e1c61eae6d84cc7fd14c943a18d71a764fb322457ca161b19bef773770a48d767ab
-
SSDEEP
49152:DliPupvCdentkPYusFzJEh7DBUxFyIGEfokrGz:D4upvCdbPESxDBUxFjRaz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 641bf19394a57bd2c96767c7e05ffad3a2fd595fe27655aa268111352ebe1064
Files
-
641bf19394a57bd2c96767c7e05ffad3a2fd595fe27655aa268111352ebe1064.exe windows:5 windows x86 arch:x86
aaa25285b7e612fb561b16e7251ceef2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_MatrixMultiply2@12
_CalcDistance@8
_TransformV3TOV4@16
_SetInverseMatrix@8
_VECTOR3Length@4
_WriteTGA@24
_Normalize@8
_SetRotationYMatrix@8
_SetRotationXMatrix@8
_TransformVector3_VPTR2@16
_RotatePositionWithPivot@24
_CrossProduct@12
_COLORtoDWORD@16
wsock32
WSAStartup
WSACleanup
closesocket
connect
inet_addr
ioctlsocket
recv
send
socket
htons
gethostbyname
dinput8
DirectInput8Create
kernel32
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetACP
GetOEMCP
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
CreateFileA
OpenProcess
TerminateProcess
CreateThread
GetLastError
GetThreadContext
ResumeThread
SetEvent
WaitForMultipleObjects
lstrcmpiA
lstrcatA
CreateEventA
GetLogicalDriveStringsA
QueryDosDeviceA
GetPriorityClass
WriteFile
SetFilePointer
InterlockedCompareExchange
GetModuleHandleA
MulDiv
GetCurrentProcessId
WriteProcessMemory
WaitForSingleObject
FindClose
RemoveDirectoryA
FindFirstFileA
FindFirstFileExW
GetConsoleCP
GetCurrentProcess
SetUnhandledExceptionFilter
GetCurrentThreadId
FormatMessageA
lstrcpynA
GetModuleFileNameA
IsBadReadPtr
GetTempPathA
SetFileAttributesA
CopyFileA
GetVersionExA
GetSystemTime
InterlockedDecrement
DeviceIoControl
GetCurrentThread
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
CreateSemaphoreW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
GetCPInfo
FatalAppExitA
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
GetCommandLineA
LoadLibraryExW
ExitThread
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetSystemTimeAsFileTime
HeapAlloc
lstrlenW
HeapFree
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
RaiseException
GetStringTypeW
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
IsValidCodePage
FindNextFileW
GetProcessHeap
FlushFileBuffers
SetConsoleCtrlHandler
CreateDirectoryW
GetFileAttributesExW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
HeapReAlloc
GetTimeZoneInformation
SetStdHandle
VirtualQuery
CreateFileW
SetEndOfFile
LocalFree
SetEnvironmentVariableA
FindNextFileA
user32
RegisterClassExA
CreateWindowExA
PeekMessageA
DispatchMessageA
TranslateMessage
ReleaseDC
GetDC
OffsetRect
ScreenToClient
GetCursorPos
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
GetClipboardData
IsDialogMessageA
GetWindowRect
GetClientRect
SetWindowTextA
GetSystemMetrics
EndDialog
SetFocus
SendDlgItemMessageA
CheckRadioButton
CheckDlgButton
GetDlgItemTextA
SetDlgItemTextA
GetDlgItemInt
RegisterHotKey
GetDlgItem
CreateDialogParamA
ClientToScreen
AnimateWindow
ShowWindow
DestroyWindow
IsWindow
CallWindowProcA
SendMessageA
EnumWindows
GetWindowTextA
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharPrevA
CharNextA
MessageBoxA
SetRect
wsprintfA
UpdateWindow
ShowCursor
LoadIconA
SetCursor
LoadCursorFromFileA
SetDlgItemInt
DefWindowProcA
EnableWindow
SetWindowPos
gdi32
CreateFontIndirectA
DeleteObject
GetTextExtentPoint32A
SelectObject
GetDeviceCaps
AddFontResourceExA
GetStockObject
RemoveFontResourceExA
comdlg32
GetOpenFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoSetProxyBlanket
oleaut32
CreateErrorInfo
GetErrorInfo
VariantChangeType
SetErrorInfo
VariantClear
VariantInit
SysFreeString
SysAllocString
freeimage
_FreeImage_SaveJPEG@12
_FreeImage_GetBits@4
_FreeImage_Unload@4
_FreeImage_GetInfo@4
_FreeImage_ConvertTo16Bits565@4
_FreeImage_Load@12
iphlpapi
GetAdaptersInfo
psapi
GetProcessImageFileNameA
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 800KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ