Static task
static1
Behavioral task
behavioral1
Sample
2f03d77e67902f1ae1f738a5cf09d338c6b19b2c2bdd2a4c7f2323b33d4860bd.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2f03d77e67902f1ae1f738a5cf09d338c6b19b2c2bdd2a4c7f2323b33d4860bd.exe
Resource
win10v2004-20230703-en
General
-
Target
2f03d77e67902f1ae1f738a5cf09d338c6b19b2c2bdd2a4c7f2323b33d4860bd
-
Size
153KB
-
MD5
523e47e33b35b8db5bf0c6f8e8063e9a
-
SHA1
3f8ee4f404d2d5346c897048d3be26164cbee511
-
SHA256
2f03d77e67902f1ae1f738a5cf09d338c6b19b2c2bdd2a4c7f2323b33d4860bd
-
SHA512
a04be4a68b3224220ad2671e53ac95fa402a530687a4cdb14d60ca8170c21f4adbf4afb2431fbf2112ae73dffe4bd4ce84aca24bd56078620dd637a1fed913bb
-
SSDEEP
1536:/YX5+Kl5/OAVoMSsHCS/jlT83FBL5JpYLZbM2wPJrMosPfLiB+XS:/25OAdS0CSblT83jLIWPJrMob+i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f03d77e67902f1ae1f738a5cf09d338c6b19b2c2bdd2a4c7f2323b33d4860bd
Files
-
2f03d77e67902f1ae1f738a5cf09d338c6b19b2c2bdd2a4c7f2323b33d4860bd.exe windows x86
66029ce689853f32171fc92e20fcba9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord457
ord11297
ord13329
ord1004
ord6835
ord9399
ord888
ord6112
ord9281
ord5098
ord11787
ord11153
ord11184
ord9449
ord7355
ord4078
ord11180
ord5238
ord3409
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord1288
ord1890
ord13310
ord11274
ord2056
ord6010
ord265
ord266
ord1231
ord6063
ord826
ord4622
ord4903
ord5095
ord8439
ord4881
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord8304
ord2063
ord2061
ord11172
ord1296
msvcr100
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
memcpy
exit
_ismbblead
_XcptFilter
_exit
_cexit
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
_CxxThrowException
malloc
free
memset
__CxxFrameHandler3
__getmainargs
memcpy_s
kernel32
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
FreeLibrary
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
GetVersion
GetVersionExA
GetLastError
GetProcAddress
LoadLibraryA
winhttp
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
WinHttpCrackUrl
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ