Static task
static1
Behavioral task
behavioral1
Sample
3adfa6416cd1ac42317e94434cdc9e073098e3290d55897d4e73ba130815be87.exe
Resource
win7-20241010-en
General
-
Target
3adfa6416cd1ac42317e94434cdc9e073098e3290d55897d4e73ba130815be87.exe
-
Size
1.9MB
-
MD5
51df8b515a00ed4b5028d2e7890bdc88
-
SHA1
462162e7092591b2cc7fb92a57407f37b41b9547
-
SHA256
3adfa6416cd1ac42317e94434cdc9e073098e3290d55897d4e73ba130815be87
-
SHA512
88e3aef0b5e00732bcec9f8907ab5b3a8642adcaa6c0b99f3f4f20a830fe6fb32936f3213df709750c1edb24b9361806a542049ef79dc8e4a7dd0d9277fbd6dc
-
SSDEEP
49152:XtUbyGqexBakUHZ5ttYSgrZfepV971aYtIvkwe8lXkXatdpQbnMp7vSi7wNTd:XtUbyGqexBakUHZ5ttYSgrZfepV971aU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3adfa6416cd1ac42317e94434cdc9e073098e3290d55897d4e73ba130815be87.exe
Files
-
3adfa6416cd1ac42317e94434cdc9e073098e3290d55897d4e73ba130815be87.exe.exe windows:4 windows x86 arch:x86
cf2e1b9d616c528c6be7063c6184ac10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiSetClassInstallParamsA
SetupDiCallClassInstaller
CM_Locate_DevNodeA
CM_Remove_SubTree
CM_Get_Sibling
CM_Get_Parent
CM_Get_DevNode_Registry_PropertyA
CM_Get_Child
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
SizeofResource
GetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetErrorMode
lstrlenW
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
ExitProcess
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitThread
SetStdHandle
GetFileType
GetACP
HeapSize
HeapReAlloc
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
WriteConsoleA
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
VirtualQuery
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
TlsFree
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
InterlockedExchange
SetConsoleCtrlHandler
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalHandle
GetProfileStringA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
OutputDebugStringA
lstrcpyA
CreateDirectoryA
GetFileAttributesA
GetLocalTime
CloseHandle
SetCommState
GetCommState
SetCommTimeouts
GetCommTimeouts
CreateFileA
ReadFile
WriteFile
SetThreadPriority
CreateThread
CreateEventA
SetPriorityClass
GetCurrentProcess
WaitForSingleObject
SetEvent
ResetEvent
FindClose
FindFirstFileA
GetLastError
CopyFileA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDefaultLangID
FreeLibrary
CreateProcessA
FindNextFileA
SetCurrentDirectoryA
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
lstrcmpA
MulDiv
SuspendThread
ResumeThread
InterlockedDecrement
InterlockedIncrement
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
lstrcpynA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
DuplicateHandle
FindResourceA
LoadResource
LockResource
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetTickCount
GetFileSize
GlobalFree
GetSystemDirectoryA
GetDriveTypeA
GetModuleFileNameA
MultiByteToWideChar
GetVolumeInformationW
WideCharToMultiByte
GetVolumeInformationA
CreateNamedPipeA
FormatMessageA
LocalFree
LocalAlloc
SetLastError
lstrlenA
lstrcatA
GetWindowsDirectoryA
GetCurrentDirectoryA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
LoadLibraryA
GetProcAddress
DeviceIoControl
GetVersionExA
AttachConsole
GetStringTypeA
user32
DeleteMenu
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
PostThreadMessageA
DestroyIcon
DestroyMenu
WindowFromPoint
IsClipboardFormatAvailable
wvsprintfA
LoadStringA
InflateRect
WaitMessage
GrayStringA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetMessageA
ValidateRect
OemToCharA
CharToOemA
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
LoadBitmapA
SetMenuItemBitmaps
EnableMenuItem
GetNextDlgTabItem
MoveWindow
IsDialogMessageA
ScrollWindowEx
IsDlgButtonChecked
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
ReleaseDC
PostMessageA
SendDlgItemMessageA
SetActiveWindow
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
GetScrollInfo
ShowScrollBar
GetWindowThreadProcessId
SetScrollRange
GetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PeekMessageA
TranslateMessage
DispatchMessageA
CharUpperA
GetClassNameA
FindWindowExA
EnumWindows
GetDesktopWindow
GetParent
UnregisterClassA
HideCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
EnableWindow
SendMessageA
FindWindowA
ScreenToClient
GetMenu
ModifyMenuA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetMenuState
CheckMenuItem
GetCursorPos
EnumChildWindows
GetWindowTextA
IsWindowVisible
IsWindowEnabled
LoadImageA
RemoveMenu
GetMenuStringA
InsertMenuA
GetDialogBaseUnits
GetSysColorBrush
LoadCursorA
MapDialogRect
SetWindowContextHelpId
GetScrollRange
ShowOwnedPopups
GetDlgItem
ShowWindow
SetWindowPos
SetFocus
GetDC
SetWindowTextA
SetWindowsHookExA
SetDlgItemTextA
UnhookWindowsHookEx
LoadIconA
IsIconic
GetSysColor
RedrawWindow
DrawFocusRect
GetWindowRect
GetClientRect
UpdateWindow
InvalidateRect
GetFocus
wsprintfA
PostQuitMessage
MessageBoxA
SetTimer
KillTimer
GetKeyNameTextA
DestroyCaret
SetScrollPos
DragDetect
EnableScrollBar
SetScrollInfo
ReleaseCapture
GetKeyState
RegisterClipboardFormatA
EmptyClipboard
PtInRect
FillRect
DrawTextA
SetCapture
CreateCaret
SetCaretPos
ShowCaret
SetCursor
IsWindow
OffsetRect
GetSystemMetrics
DrawIcon
AppendMenuA
GetSystemMenu
MapWindowPoints
gdi32
StartDocA
SaveDC
RestoreDC
SelectPalette
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
OffsetClipRgn
MoveToEx
LineTo
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
GetCurrentPositionEx
ArcTo
SetArcDirection
PolyDraw
PolylineTo
DeleteDC
PolyBezierTo
GetClipRgn
CreateRectRgn
SelectClipPath
ExtSelectClipRgn
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
ExtCreatePen
CreateHatchBrush
CreatePatternBrush
CreateDIBPatternBrushPt
PtVisible
RectVisible
ExtTextOutA
Escape
GetMapMode
SetRectRgn
CombineRgn
DPtoLP
GetTextMetricsA
CopyMetaFileA
CreateDCA
GetTextColor
GetBkColor
LPtoDP
CreateBitmap
CreateRectRgnIndirect
PatBlt
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
GetViewportOrgEx
SetViewportOrgEx
DeleteObject
SetBoundsRect
GetCharWidthA
GetTextExtentPoint32A
TextOutA
BitBlt
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontA
CreateSolidBrush
Rectangle
GetObjectA
CreatePen
CreateFontIndirectA
SetColorAdjustment
CreateDIBitmap
GetTextExtentPointA
GetStockObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyA
RegSetValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
RegQueryValueA
RegDeleteKeyA
shell32
DragQueryFileA
DragFinish
SHGetFileInfoA
DragAcceptFiles
SHGetMalloc
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
ExtractIconA
comctl32
_TrackMouseEvent
ord17
ord13
ord14
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Merge
ImageList_Read
ImageList_Write
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleIsCurrentClipboard
OleUninitialize
OleGetClipboard
CLSIDFromProgID
CLSIDFromString
CoDisconnectObject
OleDuplicateData
CoTaskMemAlloc
CreateBindCtx
SetConvertStg
WriteFmtUserTypeStg
CoTaskMemFree
OleSetClipboard
ReadFmtUserTypeStg
ReadClassStg
StringFromCLSID
CoTreatAsClass
CreateStreamOnHGlobal
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoCreateInstance
OleRun
OleInitialize
WriteClassStg
ReleaseStgMedium
CoRegisterMessageFilter
CoRegisterClassObject
CoRevokeClassObject
OleRegGetUserType
OleFlushClipboard
olepro32
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
SysStringLen
SysAllocStringByteLen
VariantCopy
VariantChangeType
SysReAllocStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
LoadTypeLi
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
SysStringByteLen
VarCyFromStr
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
SafeArrayCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
wsock32
WSACleanup
connect
sendto
recvfrom
socket
inet_ntoa
WSAAsyncSelect
send
recv
gethostbyname
closesocket
htonl
htons
bind
ioctlsocket
accept
getsockname
getpeername
ntohs
inet_addr
WSAGetLastError
WSASetLastError
WSAStartup
shutdown
iphlpapi
GetAdaptersInfo
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE