Static task
static1
Behavioral task
behavioral1
Sample
2f877380fe184040dad6ee0d95c708611c51116b63898f5f6e4acb4d0268bc28.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2f877380fe184040dad6ee0d95c708611c51116b63898f5f6e4acb4d0268bc28.exe
Resource
win10v2004-20230915-en
General
-
Target
2f877380fe184040dad6ee0d95c708611c51116b63898f5f6e4acb4d0268bc28
-
Size
400KB
-
MD5
b7b611eba913ae1a28661f249e29d2a0
-
SHA1
de476d07c2d167ca8484946c6991a30b02dc12b4
-
SHA256
2f877380fe184040dad6ee0d95c708611c51116b63898f5f6e4acb4d0268bc28
-
SHA512
b3cc35889168e291ffe6d76ff0f90c8ad1bdabbcc7acf63d0539887f59274ba72cb604323669dbd8f5ac3f251c30e8a403a6f950471d0e890387ee5273d7a624
-
SSDEEP
6144:hkRBY9S52S4+HIQHjLk1Y85RPLSHilvwBT7D:OYvKk1Y8PPIsvwBTn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f877380fe184040dad6ee0d95c708611c51116b63898f5f6e4acb4d0268bc28
Files
-
2f877380fe184040dad6ee0d95c708611c51116b63898f5f6e4acb4d0268bc28.exe windows:5 windows x86
76476d2b8d2324b28475b8219443f1ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
kernel32
GetFileAttributesA
InterlockedExchange
GetLocaleInfoA
GlobalDeleteAtom
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetCurrentDirectoryA
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
GetStartupInfoA
GetSystemTimeAsFileTime
GetFullPathNameW
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
GetACP
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GlobalFlags
GlobalAddAtomA
FlushFileBuffers
lstrcmpA
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetModuleHandleW
CompareStringA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
DeleteFileW
GetCurrentProcess
GetCurrentProcessId
CreateDirectoryW
SetUnhandledExceptionFilter
FindClose
FindNextFileW
FindFirstFileW
lstrcpyW
SetLastError
GetCurrentThreadId
CreateFileW
FindResourceW
GetModuleFileNameW
lstrlenA
MultiByteToWideChar
GetSystemDirectoryA
OpenEventA
SetFilePointer
GetFileSize
WritePrivateProfileStringA
ReadFile
DeleteFileA
CreateFileA
WriteFile
CloseHandle
Sleep
WideCharToMultiByte
FindResourceExA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
SetCurrentDirectoryA
FreeLibrary
LoadLibraryA
GetLastError
GetProcAddress
ExitProcess
CreateThread
WaitForSingleObject
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedCompareExchange
IsValidCodePage
GetProcessHeap
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetForegroundWindow
IsIconic
PostMessageA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfW
MessageBoxA
SetMenuItemBitmaps
gdi32
GetStockObject
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetDeviceCaps
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
OffsetViewportOrgEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
ole32
CoInitialize
CoUninitialize
oleaut32
VariantInit
VariantTimeToSystemTime
VarUdateFromDate
SystemTimeToVariantTime
VariantClear
VariantChangeType
netcheckalarm
?ReadGlobalMemConfig@@YAHPBDIPAX@Z
?CreateProxyProcess@@YAXAAV?$CStringT@DV?$StrTraitATL@DV?$ChTraitsCRT@D@ATL@@@ATL@@@ATL@@00H@Z
?initWsSock@@YAJXZ
?releaseWsSock@@YAXXZ
?CreateGlobalMemConfig@@YAHPBDIQAX@Z
?StopNetAudit@@YAXXZ
?BeginNetAudit@@YAXPBD@Z
?BeginNetCtrlSet@@YAXPBD0@Z
oleacc
LresultFromObject
CreateStdAccessibleObject
dbghelp
MiniDumpWriteDump
Sections
.text Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ