Static task
static1
Behavioral task
behavioral1
Sample
2e79cef5fd19a3544b4149fe04f18f2b.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
2e79cef5fd19a3544b4149fe04f18f2b.exe
Resource
win10v2004-20231201-en
General
-
Target
2e79cef5fd19a3544b4149fe04f18f2b
-
Size
181KB
-
MD5
2e79cef5fd19a3544b4149fe04f18f2b
-
SHA1
26a0b8cd46f3e0fd8a11b5884b941e11d758785b
-
SHA256
7ffb72c561e2c266b7e95d27c75c7db4702eea4ef686e4bce380e6bc64f22a95
-
SHA512
c033fb422949d65348cc7422e17669ae06c45279c53645863558d30b55f4503716633b598ac4533f741d3ba9543befd819bcf2a3553ad8e74cfb2fed2aeb5d95
-
SSDEEP
3072:O5nJ5bBK8K/z6NAuP5YDzhCY0uL0WQtLIDcV355wWeedj6Fia6DUgF8BeQOiu:OFPbBK/mNp6hhL06gh5qE6Fia6DUgWeX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e79cef5fd19a3544b4149fe04f18f2b
Files
-
2e79cef5fd19a3544b4149fe04f18f2b.exe windows:4 windows x86 arch:x86
7c4a081386308e00b13eb952a21e0996
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
FreeLibrary
LoadLibraryA
GetProcAddress
GetModuleFileNameA
GetComputerNameA
ResetEvent
CreateMutexA
ResumeThread
SuspendThread
GetLastError
PulseEvent
CreateEventA
LeaveCriticalSection
SetEvent
EnterCriticalSection
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
OpenEventA
Sleep
WaitForSingleObject
GlobalFree
LocalFree
GetLocalTime
HeapReAlloc
SetEndOfFile
GetVersion
CreateFileA
ReadFile
WriteFile
GetPrivateProfileStringA
GetPrivateProfileIntA
DeviceIoControl
GetTickCount
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
GetFileSize
GetTempPathA
UnmapViewOfFile
FlushViewOfFile
DeleteFileA
ReleaseMutex
lstrlenA
GetVersionExA
MultiByteToWideChar
lstrcmpA
LocalAlloc
WideCharToMultiByte
HeapFree
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
RtlUnwind
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetTimeZoneInformation
GetSystemTime
SetEnvironmentVariableA
GetCommandLineA
GetCurrentProcessId
GetLocaleInfoW
GetLocaleInfoA
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TlsAlloc
SetLastError
TlsGetValue
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
LCMapStringA
LCMapStringW
IsValidLocale
IsValidCodePage
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
SetFilePointer
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
advapi32
InitializeSecurityDescriptor
RegOpenKeyA
SetSecurityDescriptorDacl
RegQueryValueExA
StartServiceCtrlDispatcherA
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
CreateServiceA
DeleteService
RegOpenKeyExA
RegSetValueExA
CloseServiceHandle
RegCloseKey
StartServiceA
RegCreateKeyExA
GetUserNameA
SetServiceStatus
ReportEventA
DeregisterEventSource
RegisterServiceCtrlHandlerA
RegisterEventSourceA
wsock32
htons
bind
closesocket
select
__WSAFDIsSet
recvfrom
sendto
getsockname
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE