Static task
static1
Behavioral task
behavioral1
Sample
2329cbdac3c7d3695dea9a13b034db48.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2329cbdac3c7d3695dea9a13b034db48.exe
Resource
win10v2004-20231222-en
General
-
Target
2329cbdac3c7d3695dea9a13b034db48
-
Size
55KB
-
MD5
2329cbdac3c7d3695dea9a13b034db48
-
SHA1
fd5fbfea3ecebe78ea837489d05fdb0b47318373
-
SHA256
e86d60ba733dc0cb2084ef830cd9bbe04802c0ac1e911b36790c542fce51f412
-
SHA512
2e3e79ab1a65115e86fde8e4053cc0106cbbffdfd8b58ddd76185fb5cf0858d04c26439ee4c783a0de37ba8434bb79323ecad0f338527fcc0c1b407b810ee0a4
-
SSDEEP
768:QOsIj3u68He1yM/saM0obt3c8+C3ef8M+RI7CMeytSTk4Pf5D6O/QXBUqn21lrB6:QXIK6H/hBo5M8aOygk4PBeRU2olWx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2329cbdac3c7d3695dea9a13b034db48
Files
-
2329cbdac3c7d3695dea9a13b034db48.exe windows:4 windows x86 arch:x86
4792f37992042195ae8f17889a0d60ae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfig2A
CreateServiceA
FreeSid
GetSecurityDescriptorControl
GetTokenInformation
LookupPrivilegeValueA
RegFlushKey
RegOpenKeyA
RegQueryInfoKeyA
SetSecurityDescriptorDacl
kernel32
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
EnumSystemLocalesA
ExitProcess
ExitThread
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetConsoleCP
GetCurrentProcess
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentVariableA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempPathA
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsValidCodePage
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MoveFileA
QueryPerformanceCounter
RaiseException
RtlUnwind
SearchPathA
SetCurrentDirectoryA
SetEndOfFile
SetFileTime
SetPriorityClass
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SuspendThread
SystemTimeToFileTime
TlsAlloc
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WriteConsoleA
lstrlenA
user32
BeginPaint
CharNextA
CharPrevA
CharUpperA
CheckDlgButton
CreateWindowExA
DrawIcon
EnableMenuItem
EndPaint
GetCursorPos
GetDesktopWindow
GetFocus
GetMessagePos
GetProcessWindowStation
GetWindowLongA
IsChild
IsIconic
IsWindow
LoadCursorA
LoadIconA
MapWindowPoints
MessageBoxA
RegisterClipboardFormatA
SendDlgItemMessageA
SetCursor
SetMenu
SetWindowTextA
SystemParametersInfoA
UnhookWindowsHookEx
UnregisterClassA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ