Static task
static1
Behavioral task
behavioral1
Sample
2e1f777b084fc1e18192d83a2bca4437854632cc65230b08281118ab12b060fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2e1f777b084fc1e18192d83a2bca4437854632cc65230b08281118ab12b060fc.exe
Resource
win10v2004-20230220-en
General
-
Target
2e1f777b084fc1e18192d83a2bca4437854632cc65230b08281118ab12b060fc
-
Size
312KB
-
MD5
9259185e93d0a020d53e5d34e5cd5194
-
SHA1
90651e927706d59b79171f10546bd58c1ddb45c4
-
SHA256
2e1f777b084fc1e18192d83a2bca4437854632cc65230b08281118ab12b060fc
-
SHA512
784a8c481f89741bc2b5b133dd066d331a5f8317d1ac49453b103773971e7529c5e34bec418eb602e8ae677bd4a0c5c2f83289631a85dce030a2ffdd2b2bc1fe
-
SSDEEP
6144:KBKwo+dnwN2QtOsC09HymmFpWFZq5fooVq2Tc:KBpoqnwN2QS09S9MZIfho2I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2e1f777b084fc1e18192d83a2bca4437854632cc65230b08281118ab12b060fc
Files
-
2e1f777b084fc1e18192d83a2bca4437854632cc65230b08281118ab12b060fc.exe windows x86
f6cf11dd58eb8f8d926882e6663630c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
SearchPathW
GetDriveTypeW
GetProfileIntW
GetNumberOfConsoleInputEvents
InterlockedIncrement
EnumCalendarInfoW
InterlockedDecrement
GlobalSize
InitializeSListHead
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
GetConsoleTitleA
ReadConsoleW
SetCommState
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
AddRefActCtx
LoadLibraryW
GetConsoleAliasExesLengthW
GetStringTypeExW
GetFileAttributesA
WriteConsoleW
GetOverlappedResult
GetVolumePathNameA
FindNextVolumeMountPointW
RaiseException
GlobalUnfix
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
RemoveDirectoryA
SetComputerNameA
VerLanguageNameW
PrepareTape
LoadLibraryA
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
AddAtomW
BeginUpdateResourceA
SetThreadIdealProcessor
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
GetStringTypeW
EnumDateFormatsW
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
EnumSystemLocalesW
DeleteFileA
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileW
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.munuhav Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ