Static task
static1
Behavioral task
behavioral1
Sample
6522d720f6d70c887d6f34569b1971154ebca02ba74d0e96bf3ec76a002d66d7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6522d720f6d70c887d6f34569b1971154ebca02ba74d0e96bf3ec76a002d66d7.exe
Resource
win10v2004-20241007-en
General
-
Target
6522d720f6d70c887d6f34569b1971154ebca02ba74d0e96bf3ec76a002d66d7
-
Size
3.0MB
-
MD5
591f962c68b0b1ccba472fd4e9b4c93e
-
SHA1
f3da148e556b04bd8e6c5a301569b262ed949afa
-
SHA256
6522d720f6d70c887d6f34569b1971154ebca02ba74d0e96bf3ec76a002d66d7
-
SHA512
e08da34719f866c29291ea09262b509fe4e4353f210870e9e0797a38b0fc9f44aa49864eb92aaf8c45fa185ddd443a765c8282851a699cd3baf809a1c56c862e
-
SSDEEP
49152:dyAfR1Fbbk2uH+d23RKbT7VPHa/83wHU4zIZbyQk0xP3UvsEnMUU/SFl4mBavOw0:DfR1Fbb2BKbTKIZbyQk0xP3UxnMc0vOk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6522d720f6d70c887d6f34569b1971154ebca02ba74d0e96bf3ec76a002d66d7
Files
-
6522d720f6d70c887d6f34569b1971154ebca02ba74d0e96bf3ec76a002d66d7.exe windows:6 windows x86 arch:x86
ae58fe16588e11fb3134cc28f8a32b25
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_TransformV3TOV4@16
_MatrixMultiply2@12
_CalcDistance@8
_RotatePositionWithPivot@24
_TransformVector3_VPTR2@16
_SetInverseMatrix@8
_CrossProduct@12
_SetRotationXMatrix@8
_SetRotationYMatrix@8
_Normalize@8
_WriteTGA@24
_COLORtoDWORD@16
_VECTOR3Length@4
wsock32
inet_addr
closesocket
connect
htons
gethostbyname
recv
send
socket
WSAStartup
ioctlsocket
WSACleanup
dinput8
DirectInput8Create
kernel32
OutputDebugStringW
HeapReAlloc
GetThreadTimes
GetFileSize
CloseHandle
GetLocalTime
OpenFile
IsDBCSLeadByte
CreateDirectoryA
GetTickCount
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetSystemDefaultLangID
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
lstrcmpA
lstrcpyA
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
ReadFile
GetLastError
SetEvent
CreateEventA
TerminateProcess
CreateThread
ResumeThread
GetPriorityClass
GetThreadContext
OpenProcess
WaitForMultipleObjects
lstrcmpiA
lstrcatA
GetLogicalDriveStringsA
QueryDosDeviceA
GetModuleHandleA
MulDiv
WriteFile
FindClose
FindFirstFileA
FindNextFileA
RemoveDirectoryA
GetCurrentProcessId
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentProcess
FreeLibraryAndExitThread
GetCurrentThreadId
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
CopyFileA
WaitForSingleObject
GetVersionExA
GetSystemTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryW
GetFileAttributesExW
FlushFileBuffers
GetProcessHeap
FindNextFileW
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
CreateTimerQueue
GetVersionExW
VirtualAlloc
VirtualFree
GetModuleFileNameW
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
GetTimeZoneInformation
SetStdHandle
VirtualQuery
CreateFileW
CreateSemaphoreW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
GetFileType
GetStdHandle
GetCommandLineA
LoadLibraryExW
ExitThread
LoadLibraryW
SetEndOfFile
SetEnvironmentVariableA
LocalFree
WriteConsoleW
GetCPInfo
GetCurrentThread
InitializeCriticalSectionAndSpinCount
SetLastError
DuplicateHandle
GetExitCodeThread
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetStringTypeW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleExW
AreFileApisANSI
UnhandledExceptionFilter
user32
ShowWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
UnregisterHotKey
RegisterHotKey
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
ReleaseDC
GetDC
ScreenToClient
GetCursorPos
ReleaseCapture
SetCapture
IsClipboardFormatAvailable
GetClipboardData
OffsetRect
GetWindowThreadProcessId
EnumWindows
PostMessageA
CopyRect
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharPrevA
CharNextA
MessageBoxA
SetRect
wsprintfA
GetClientRect
LoadCursorFromFileA
SetCursor
LoadIconA
ShowCursor
UpdateWindow
GetSystemMetrics
GetWindowTextA
gdi32
GetStockObject
RemoveFontResourceExA
AddFontResourceExA
GetDeviceCaps
GetTextExtentPoint32A
DeleteObject
CreateFontIndirectA
SelectObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
shell32
ShellExecuteA
ole32
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
freeimage
_FreeImage_Unload@4
_FreeImage_GetBits@4
_FreeImage_GetInfo@4
_FreeImage_ConvertTo16Bits565@4
_FreeImage_SaveJPEG@12
_FreeImage_Load@12
psapi
GetProcessImageFileNameA
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 700KB - Virtual size: 963KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ