Static task
static1
Behavioral task
behavioral1
Sample
c2261e16897a08c173c583120ea402e5741dc77aa88d49ff7f710bd77a11e95d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c2261e16897a08c173c583120ea402e5741dc77aa88d49ff7f710bd77a11e95d.exe
Resource
win10v2004-20231020-en
General
-
Target
c2261e16897a08c173c583120ea402e5741dc77aa88d49ff7f710bd77a11e95d
-
Size
2.9MB
-
MD5
9045ed72f8b954e14a4a05ba9220a152
-
SHA1
744a09ef3deb518b42be081d18d39c39fdfd6c86
-
SHA256
c2261e16897a08c173c583120ea402e5741dc77aa88d49ff7f710bd77a11e95d
-
SHA512
943b6a418a6d905487786fad64f9f85944b9efaed3dfb4220697c7dae5f009aedfe9c13513493bc16c513df7c8b82e74f90576c85f1c005ab5a3af87199cc785
-
SSDEEP
49152:VC5L+gx4+spJwqTU3ITPX+vQcE3uHAFWrLPq:Oy+sIXIbX+vQcE+H/jq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2261e16897a08c173c583120ea402e5741dc77aa88d49ff7f710bd77a11e95d
Files
-
c2261e16897a08c173c583120ea402e5741dc77aa88d49ff7f710bd77a11e95d.exe windows:5 windows x86
12fcb0ef2b20299dbf332053b0b98fe9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSizeEx
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapReAlloc
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
VirtualQuery
ExitThread
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetConsoleCtrlHandler
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
LoadLibraryW
PeekNamedPipe
GetFileInformationByHandle
ReadConsoleInputA
GetDriveTypeA
ExpandEnvironmentStringsA
SetConsoleMode
lstrcpyW
CompareFileTime
lstrcpyA
GetVersionExW
GetWindowsDirectoryA
FlushConsoleInputBuffer
FileTimeToLocalFileTime
GlobalMemoryStatus
GetVersion
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
AllocConsole
ResetEvent
OutputDebugStringA
InterlockedCompareExchange
TlsGetValue
LocalAlloc
GetModuleHandleW
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalAddAtomA
CreateEventA
SetEvent
FreeResource
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
FreeLibrary
GetProcAddress
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
GetThreadLocale
MoveFileA
lstrcmpA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
lstrlenA
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetCurrentDirectoryA
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetQueuedCompletionStatus
TerminateThread
WaitForSingleObject
PostQueuedCompletionStatus
CreateThread
GetSystemInfo
CreateIoCompletionPort
GetPrivateProfileIntA
FindResourceA
LoadResource
LockResource
SizeofResource
WritePrivateProfileStringA
GetPrivateProfileStringA
GetFileAttributesA
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
FindClose
DeleteFileA
FindNextFileA
FindFirstFileA
CreateDirectoryA
GetModuleFileNameA
GetModuleHandleA
SetUnhandledExceptionFilter
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
CreateFileA
CreateFileW
user32
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
PtInRect
GetDlgCtrlID
CallWindowProcA
GetMenu
SetWindowLongA
OffsetRect
IsChild
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
ReleaseDC
GetDC
CopyRect
SetCursor
SetWindowsHookExA
CallNextHookEx
DestroyMenu
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
wsprintfA
EnableWindow
LoadIconA
GetSystemMenu
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
WinHelpA
SendDlgItemMessageA
RegisterWindowMessageA
GetWindow
SetWindowContextHelpId
GetDlgItemTextA
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
AppendMenuA
SendMessageA
IsIconic
GetSystemMetrics
ReleaseCapture
GetClientRect
MoveWindow
ShowWindow
IntersectRect
LoadStringA
DrawIcon
KillTimer
GetMessageA
DialogBoxParamA
SetTimer
DefWindowProcA
PostThreadMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetWindowThreadProcessId
CharUpperA
PostMessageA
PostQuitMessage
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetWindowDC
RegisterClipboardFormatA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
BeginPaint
SetCapture
LoadCursorA
GetSysColorBrush
TranslateMessage
EndPaint
SetWindowPos
MapDialogRect
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
SetMapMode
GetStockObject
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
GetDeviceCaps
comdlg32
GetOpenFileNameA
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegEnumKeyExA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
LsaNtStatusToWinError
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
PathStripToRootA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleIsCurrentClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoRevokeClassObject
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemFree
OleInitialize
oleaut32
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocString
urlmon
URLDownloadToCacheFileA
ws2_32
WSARecvFrom
WSASocketA
gethostbyname
WSAStartup
ntohs
htons
WSAIoctl
htonl
bind
inet_ntoa
closesocket
WSARecv
WSACleanup
recv
send
WSASetLastError
socket
setsockopt
connect
gethostname
WSAGetLastError
inet_addr
getnameinfo
getaddrinfo
freeaddrinfo
WSASend
wsock32
inet_ntoa
__WSAFDIsSet
gethostbyaddr
sendto
getsockopt
shutdown
select
getsockname
secur32
LsaGetLogonSessionData
LsaCallAuthenticationPackage
LsaConnectUntrusted
LsaFreeReturnBuffer
LsaLookupAuthenticationPackage
dbghelp
MiniDumpWriteDump
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.������� Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.������� Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ