Static task
static1
Behavioral task
behavioral1
Sample
cfa3ee52793b0d3235309b87507a0ae4e7b4afcaa7dbd4f896e06fc4b403d9b5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfa3ee52793b0d3235309b87507a0ae4e7b4afcaa7dbd4f896e06fc4b403d9b5.exe
Resource
win10v2004-20240802-en
General
-
Target
cfa3ee52793b0d3235309b87507a0ae4e7b4afcaa7dbd4f896e06fc4b403d9b5
-
Size
3.0MB
-
MD5
f7d4ee43a2fb870167f38aba288afb3d
-
SHA1
0274a1a8005f7bc962899b8bdb3f3540c9a88ff9
-
SHA256
cfa3ee52793b0d3235309b87507a0ae4e7b4afcaa7dbd4f896e06fc4b403d9b5
-
SHA512
d5aaccdc80e680c19fd7f8980e4892c71c55dff312cd2174984d4b931fa4017701ec54f6cac9a5c40ce4c83a3c2ed563f4ca08a5a8253ef871566f8a46ca764e
-
SSDEEP
49152:6DJPkWPPmhCNeVCzc3LRWu++aOL9uvgpCsp753SODTPU/SFl49zn+3FUpYJks4IW:UPkWPQCw3LRhCsp75CODTazn+3FUpYJq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfa3ee52793b0d3235309b87507a0ae4e7b4afcaa7dbd4f896e06fc4b403d9b5
Files
-
cfa3ee52793b0d3235309b87507a0ae4e7b4afcaa7dbd4f896e06fc4b403d9b5.exe windows:5 windows x86 arch:x86
743aa676303e8318ad2b7e2b119476bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_VECTOR3Length@4
_CrossProduct@12
_WriteTGA@24
_Normalize@8
_SetRotationYMatrix@8
_SetRotationXMatrix@8
_TransformVector3_VPTR2@16
_RotatePositionWithPivot@24
_CalcDistance@8
_MatrixMultiply2@12
_TransformV3TOV4@16
_SetInverseMatrix@8
_COLORtoDWORD@16
wsock32
inet_addr
gethostbyname
WSAStartup
WSACleanup
socket
send
recv
ioctlsocket
htons
connect
closesocket
dinput8
DirectInput8Create
kernel32
OutputDebugStringW
FreeEnvironmentStringsW
GetTimeZoneInformation
EnterCriticalSection
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
CreateFileA
GetLastError
lstrcmpiA
InterlockedCompareExchange
GetModuleHandleA
MulDiv
WriteFile
VerSetConditionMask
OpenProcess
GetCurrentProcess
GetCurrentProcessId
ExitProcess
CreateThread
GetProcessId
WriteProcessMemory
WaitForSingleObject
FindClose
DuplicateHandle
RemoveDirectoryA
FindFirstFileA
FindNextFileA
VerifyVersionInfoA
InterlockedExchange
VirtualQuery
TerminateProcess
SetStdHandle
LeaveCriticalSection
TerminateThread
SetUnhandledExceptionFilter
GetCurrentThreadId
lstrcatA
GetModuleFileNameA
GetLogicalDriveStringsA
GetTempPathA
QueryDosDeviceA
SetFileAttributesA
GetSystemTimeAsFileTime
GetVersionExA
GetSystemTime
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryW
GetFileAttributesExW
FlushFileBuffers
GetProcessHeap
FindNextFileW
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
DeleteCriticalSection
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
GetCPInfo
WriteConsoleW
GetModuleFileNameW
GetFileType
GetExitCodeProcess
CreateProcessA
CreateFileW
SetEnvironmentVariableA
SetEndOfFile
LocalFree
GetCurrentThread
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapFree
HeapAlloc
GetStdHandle
GetCommandLineA
LoadLibraryExW
ExitThread
AreFileApisANSI
GetModuleHandleExW
HeapReAlloc
CopyFileA
user32
GetCursorPos
wsprintfA
SetRect
MessageBoxA
CharNextA
CharPrevA
OpenClipboard
GetClientRect
LoadCursorFromFileA
SetCursor
GetWindowThreadProcessId
PostQuitMessage
LoadIconA
FindWindowExA
FindWindowA
ShowCursor
UpdateWindow
GetSystemMetrics
ShowWindow
CreateWindowExA
RegisterClassExA
RegisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
ReleaseDC
GetDC
ScreenToClient
DefWindowProcA
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
GetClipboardData
OffsetRect
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
gdi32
GetStockObject
RemoveFontResourceExA
GetDeviceCaps
SelectObject
GetTextExtentPoint32A
DeleteObject
CreateFontIndirectA
advapi32
GetUserNameA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
oleaut32
VariantClear
freeimage
_FreeImage_ConvertTo16Bits565@4
_FreeImage_Unload@4
_FreeImage_GetBits@4
_FreeImage_Load@12
_FreeImage_GetInfo@4
_FreeImage_SaveJPEG@12
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 695KB - Virtual size: 938KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ