Static task
static1
Behavioral task
behavioral1
Sample
2ee46a78aeddae94cc3488b09d219556e25f693e0418c8e5f05c9647a61ef979.exe
Resource
win10-20230220-en
General
-
Target
2ee46a78aeddae94cc3488b09d219556e25f693e0418c8e5f05c9647a61ef979
-
Size
262KB
-
MD5
932d8d44367688e7abf206199d7af878
-
SHA1
28c4e898673c407665246d3f7311bcbb1332b5ed
-
SHA256
2ee46a78aeddae94cc3488b09d219556e25f693e0418c8e5f05c9647a61ef979
-
SHA512
a7325fd4aa2683ab0b94c8b934e53ef24aaf5f27163fe2eff8799a54e4d5db10a89cb250674b0b8d252ad357d71e72a8fb46b9301f086ecff3ceaba8e9163766
-
SSDEEP
3072:4ePtdr57zXZ5Z3YlOgZNmiEyDJYhHUY7TVxXf6BT8mu3OexNol6:DP7JXDZ32Oge2DyhHUWTV9bmANol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ee46a78aeddae94cc3488b09d219556e25f693e0418c8e5f05c9647a61ef979
Files
-
2ee46a78aeddae94cc3488b09d219556e25f693e0418c8e5f05c9647a61ef979.exe windows x86
2ae78f9a1d4a7f418a7ddb8a7520182b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathW
GetStringTypeA
GetDriveTypeW
GetProfileIntW
GetNumberOfConsoleInputEvents
BuildCommDCBAndTimeoutsA
InterlockedIncrement
EnumCalendarInfoW
SetDefaultCommConfigW
InitializeSListHead
GetProfileSectionA
SetComputerNameW
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
ReadConsoleW
SetCommState
GetDriveTypeA
GetVolumePathNameW
GetPrivateProfileIntA
AddRefActCtx
LoadLibraryW
FreeConsole
GetConsoleAliasExesLengthW
GetFileAttributesA
GetOverlappedResult
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
SetFirmwareEnvironmentVariableW
RemoveDirectoryA
VerLanguageNameW
PrepareTape
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
SetCalendarInfoW
FindFirstVolumeMountPointW
AddAtomW
GlobalWire
GetModuleFileNameA
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
GetStringTypeW
SetThreadAffinityMask
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
GlobalReAlloc
EnumSystemLocalesW
DeleteFileA
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleW
SetFilePointer
CreateFileW
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xog Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ