Static task
static1
Behavioral task
behavioral1
Sample
2db321b38583ae793b6acf4911fc46ff186d7752bce1f0066b1f4d793a030234.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2db321b38583ae793b6acf4911fc46ff186d7752bce1f0066b1f4d793a030234.exe
Resource
win10v2004-20230915-en
General
-
Target
2db321b38583ae793b6acf4911fc46ff186d7752bce1f0066b1f4d793a030234
-
Size
164KB
-
MD5
20bb3d7074ef5b1a9e389b42fb97010b
-
SHA1
f4b75df296d3c3bc92cbe8d9ee5941e6bc78e9a6
-
SHA256
2db321b38583ae793b6acf4911fc46ff186d7752bce1f0066b1f4d793a030234
-
SHA512
ef54a1344d7b990c359716a61b1fb21d06e325969483bc794f9d7c5c17c11fd8bd13dfba0ee6a43d1195b9ba776c86b67e55ef38c0055f4f282d9b946e0db999
-
SSDEEP
1536:7BoE36wNkxP8ZSa6THmaJIDKAkkjCfnaE2FJbOLdb87x/F:79OhTHpJInkKE2FoLdbK/F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2db321b38583ae793b6acf4911fc46ff186d7752bce1f0066b1f4d793a030234
Files
-
2db321b38583ae793b6acf4911fc46ff186d7752bce1f0066b1f4d793a030234.exe windows:4 windows x86
e595fb56e41c424dc5fb68ded2efe11e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord809
ord640
ord641
ord2639
ord2122
ord556
ord323
ord324
ord825
ord3626
ord3663
ord2414
ord4234
ord755
ord470
ord1087
ord1168
ord4299
ord1146
ord5785
ord1641
ord1640
ord6215
ord2379
ord1727
ord613
ord800
ord4133
ord4297
ord6172
ord5875
ord2818
ord540
ord5787
ord5788
ord472
ord284
ord289
ord2452
ord4853
ord5280
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord561
ord815
ord3597
ord2859
ord4224
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4376
ord5265
ord3571
ord6357
ord1816
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_setmbcp
__CxxFrameHandler
_CxxThrowException
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_controlfp
kernel32
GetStartupInfoA
Sleep
GlobalAlloc
GlobalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
CloseHandle
WriteFile
ExitProcess
CreateFileA
user32
GetClientRect
DrawIcon
LoadIconA
EnableWindow
SetCursor
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
PtInRect
LoadBitmapA
LoadCursorA
GetDC
IsRectEmpty
GetSystemMetrics
SendMessageA
IsIconic
gdi32
BitBlt
GetDIBits
GetObjectA
CreateBitmapIndirect
GetPixel
SetBrushOrgEx
Rectangle
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
StretchBlt
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ