Static task
static1
Behavioral task
behavioral1
Sample
83a65659ac5c663ef1ca86243ea17be66bb5d6161b28e532817b2ba3a56657c1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83a65659ac5c663ef1ca86243ea17be66bb5d6161b28e532817b2ba3a56657c1.exe
Resource
win10v2004-20241007-en
General
-
Target
83a65659ac5c663ef1ca86243ea17be66bb5d6161b28e532817b2ba3a56657c1
-
Size
3.0MB
-
MD5
842095b7df6b8df23d54642fdea2f382
-
SHA1
f056824959be76a7e0ad8cdf1f4530a769bd8074
-
SHA256
83a65659ac5c663ef1ca86243ea17be66bb5d6161b28e532817b2ba3a56657c1
-
SHA512
6e529fc1949482ada287d3f4070468ef7c27e53173a48979293b2fdb066bda918439259e2fa685f90f7c95c262e297f9d13ff3d7719efc26de3ff6bee821b417
-
SSDEEP
98304:LfR1Fbb2BKbTKIZbyQk0xP3UxnMc0vOwikHaxlel5lqu:zR1Fbb2BKbTKIZbyQk0xP3UxnMc0vOwf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83a65659ac5c663ef1ca86243ea17be66bb5d6161b28e532817b2ba3a56657c1
Files
-
83a65659ac5c663ef1ca86243ea17be66bb5d6161b28e532817b2ba3a56657c1.exe windows:6 windows x86 arch:x86
ae58fe16588e11fb3134cc28f8a32b25
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_TransformV3TOV4@16
_MatrixMultiply2@12
_CalcDistance@8
_RotatePositionWithPivot@24
_TransformVector3_VPTR2@16
_SetInverseMatrix@8
_CrossProduct@12
_SetRotationXMatrix@8
_SetRotationYMatrix@8
_Normalize@8
_WriteTGA@24
_COLORtoDWORD@16
_VECTOR3Length@4
wsock32
inet_addr
closesocket
connect
htons
gethostbyname
recv
send
socket
WSAStartup
ioctlsocket
WSACleanup
dinput8
DirectInput8Create
kernel32
OutputDebugStringW
HeapReAlloc
GetThreadTimes
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
ReadFile
GetLastError
SetEvent
CreateEventA
TerminateProcess
CreateThread
ResumeThread
GetPriorityClass
GetThreadContext
OpenProcess
WaitForMultipleObjects
lstrcmpiA
lstrcatA
GetLogicalDriveStringsA
QueryDosDeviceA
GetModuleHandleA
MulDiv
WriteFile
FindClose
FindFirstFileA
FindNextFileA
RemoveDirectoryA
GetCurrentProcessId
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentProcess
FreeLibraryAndExitThread
GetCurrentThreadId
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
CopyFileA
WaitForSingleObject
GetVersionExA
GetSystemTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryW
GetFileAttributesExW
FlushFileBuffers
GetProcessHeap
FindNextFileW
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
CreateTimerQueue
GetVersionExW
VirtualAlloc
VirtualFree
GetModuleFileNameW
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
GetTimeZoneInformation
SetStdHandle
VirtualQuery
CreateFileW
CreateSemaphoreW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
GetFileType
GetStdHandle
GetCommandLineA
LoadLibraryExW
ExitThread
LoadLibraryW
SetEndOfFile
SetEnvironmentVariableA
LocalFree
WriteConsoleW
GetCPInfo
GetCurrentThread
InitializeCriticalSectionAndSpinCount
SetLastError
DuplicateHandle
GetExitCodeThread
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetStringTypeW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleExW
AreFileApisANSI
UnhandledExceptionFilter
user32
ShowWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
UnregisterHotKey
RegisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
ReleaseDC
GetDC
ScreenToClient
GetCursorPos
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
GetClipboardData
OffsetRect
GetWindowThreadProcessId
EnumWindows
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharPrevA
CharNextA
MessageBoxA
SetRect
wsprintfA
GetClientRect
LoadCursorFromFileA
SetCursor
LoadIconA
ShowCursor
UpdateWindow
GetSystemMetrics
GetWindowTextA
gdi32
GetStockObject
RemoveFontResourceExA
AddFontResourceExA
GetDeviceCaps
GetTextExtentPoint32A
DeleteObject
CreateFontIndirectA
SelectObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
shell32
ShellExecuteA
ole32
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
freeimage
_FreeImage_Unload@4
_FreeImage_GetBits@4
_FreeImage_GetInfo@4
_FreeImage_ConvertTo16Bits565@4
_FreeImage_SaveJPEG@12
_FreeImage_Load@12
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 700KB - Virtual size: 963KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�0��u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE