Static task
static1
Behavioral task
behavioral1
Sample
2fe05c6cf934acfba420274c3f69f5627ae5b4077b1132f189b87f6de454ad6d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2fe05c6cf934acfba420274c3f69f5627ae5b4077b1132f189b87f6de454ad6d.exe
Resource
win10v2004-20230703-en
General
-
Target
2fe05c6cf934acfba420274c3f69f5627ae5b4077b1132f189b87f6de454ad6d
-
Size
118KB
-
MD5
07a37c4066d8cee12eec26b1fa33b687
-
SHA1
c82eca4efaa35da8fadb247710b162528ae85e55
-
SHA256
2fe05c6cf934acfba420274c3f69f5627ae5b4077b1132f189b87f6de454ad6d
-
SHA512
4a53ca12ec1cc609a1e64a1cd372503e700d0169fb07c508e2c9f6f5f9ccc26d3458bfb38a9fda24b33ff12af6805b8eb8f06406d8665d878a838bf22bd88863
-
SSDEEP
768:p/Vfuj/GQ3F2l8YPSM9hs36CcxRj0qgiE9Sbh9Sb:P+GKn4SM9hJCcVEC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fe05c6cf934acfba420274c3f69f5627ae5b4077b1132f189b87f6de454ad6d
Files
-
2fe05c6cf934acfba420274c3f69f5627ae5b4077b1132f189b87f6de454ad6d.exe windows x86
934d1781ff874285a554adbfa3ccddbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
DeleteCriticalSection
GetTickCount
MoveFileW
GetDriveTypeW
GetCurrentProcess
GetVersionExW
OpenProcess
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetCurrentProcessId
FreeLibrary
TerminateProcess
K32GetModuleFileNameExW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CreateProcessW
OutputDebugStringW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
CloseHandle
DeleteFileW
GetLastError
SetFileAttributesW
GetFileAttributesW
FindClose
InitializeCriticalSectionEx
FindFirstFileW
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
ResetEvent
SetEvent
IsDebuggerPresent
user32
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
LookupAccountSidW
GetTokenInformation
ole32
CoTaskMemFree
msvcp140
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
shlwapi
PathFileExistsW
PathFindFileNameW
vcruntime140
_except_handler4_common
_CxxThrowException
__std_exception_copy
memset
memmove
__std_exception_destroy
__CxxFrameHandler3
memcpy
api-ms-win-crt-string-l1-1-0
wcscpy_s
_wcsicmp
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
free
_callnewh
api-ms-win-crt-runtime-l1-1-0
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_c_exit
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_cexit
_invalid_parameter_noinfo_noreturn
terminate
_controlfp_s
_crt_atexit
_initialize_onexit_table
_set_app_type
_register_onexit_function
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ