Static task
static1
Behavioral task
behavioral1
Sample
c2ef8ee1cc6846b7bb213fff632458da30e0a1c14a4921734a0d378433997a2d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c2ef8ee1cc6846b7bb213fff632458da30e0a1c14a4921734a0d378433997a2d.exe
Resource
win10v2004-20230915-en
General
-
Target
c2ef8ee1cc6846b7bb213fff632458da30e0a1c14a4921734a0d378433997a2d
-
Size
2.8MB
-
MD5
76bd4eee03808efbdd9fbe62db37a021
-
SHA1
5af31c380be72810e9778a7b2b54a0eab8d6cf13
-
SHA256
c2ef8ee1cc6846b7bb213fff632458da30e0a1c14a4921734a0d378433997a2d
-
SHA512
58fa587d2a187560c3d5d5d9bbead86ba738a15104890fef6a7e84f3ec403e4ebc6758cd6c44df512f8ee9c31c4a5db84488338ccc6b15d58647b8a4b7e06644
-
SSDEEP
49152:Fxll7xxSIpwEUerb+YpDK5R9owwwwsEJfgIRkApT4mOiobZx:Dll7xxnwE/JoIRhjo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2ef8ee1cc6846b7bb213fff632458da30e0a1c14a4921734a0d378433997a2d
Files
-
c2ef8ee1cc6846b7bb213fff632458da30e0a1c14a4921734a0d378433997a2d.exe windows:5 windows x86
df15bf0cdaca3328fa0ee6495a6f5304
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
GetPrivateProfileStringW
InterlockedExchange
SetLastError
InterlockedExchangeAdd
GetTickCount
lstrlenW
GetFileAttributesW
LocalFree
HeapAlloc
WriteConsoleW
HeapSize
SetStdHandle
CreateThread
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
CreateFileMappingW
FreeLibrary
GetProcAddress
FileTimeToLocalFileTime
LoadLibraryW
FileTimeToSystemTime
GetCurrentThreadId
VirtualQuery
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetModuleFileNameW
QueryDosDeviceW
GetCurrentProcess
CloseHandle
CreateEventW
GetCurrentProcessId
GetLastError
Sleep
GetProcessHeap
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
GetDriveTypeW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
CreateFileW
GetFileAttributesExW
ExpandEnvironmentStringsW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
SearchPathW
TerminateProcess
OpenEventW
SetEvent
ResetEvent
GetACP
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameExW
GlobalAlloc
GlobalFree
LoadLibraryA
LoadLibraryExW
GetVolumeInformationW
GetDiskFreeSpaceW
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
FormatMessageW
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
CreateMutexW
ReleaseMutex
OpenMutexW
DeviceIoControl
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
GetStdHandle
GetFileType
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
HeapReAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
MoveFileExW
user32
MessageBoxW
GetParent
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassW
GetWindowThreadProcessId
GetWindowRect
GetFocus
SetWindowPos
GetSystemMetrics
GetShellWindow
WindowFromPoint
AttachThreadInput
GetForegroundWindow
SetFocus
GetClassNameW
GetDesktopWindow
advapi32
ReportEventW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
DeleteService
ControlService
StartServiceW
OpenServiceW
LookupPrivilegeValueW
AdjustTokenPrivileges
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
EqualSid
AllocateAndInitializeSid
FreeSid
GetTokenInformation
RegCloseKey
OpenProcessToken
RegOpenKeyW
RegQueryValueExW
DeregisterEventSource
RegisterEventSourceW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHFileOperationW
ole32
CoCreateInstance
psapi
GetProcessImageFileNameW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE