Static task
static1
Behavioral task
behavioral1
Sample
2a450bf1d79f1cd95a999f54b1064fa7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a450bf1d79f1cd95a999f54b1064fa7.exe
Resource
win10v2004-20231215-en
General
-
Target
2a450bf1d79f1cd95a999f54b1064fa7
-
Size
208KB
-
MD5
2a450bf1d79f1cd95a999f54b1064fa7
-
SHA1
1fdbefb673e495dcdfcff67c2ba322639cd36b20
-
SHA256
7de4e527d99c6c49965ed7216f1f51e45e8ba154d795094ba75565b046034650
-
SHA512
90dce1b9f0bf4ab54ddf88e96dfd43338b58930583f7389a2334fb6bac86267dc264832c8f6a72dccf780129b04c7aa36771485cc60c87f827cd88e03ca2b1f7
-
SSDEEP
3072:hLLFp/ljbCjrL0oNa/rInoUtq1cGZuqMbeTxKI0oWSLvBSq2R7XIbHmSDZX:tnlqj30oAzUtq1cGss0ILYqw7X7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a450bf1d79f1cd95a999f54b1064fa7
Files
-
2a450bf1d79f1cd95a999f54b1064fa7.exe windows:4 windows x86 arch:x86
6ae75b121d33383f73885b13d1fec55d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteValueA
PathGetCharTypeA
PathIsContentTypeA
SHQueryInfoKeyA
SHEnumValueA
SHDeleteKeyA
msvcrt
memset
srand
pow
strcmp
comdlg32
ChooseColorA
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
user32
RegisterWindowMessageA
RedrawWindow
MessageBoxA
PeekMessageW
PostMessageA
LoadIconA
OffsetRect
PostQuitMessage
PeekMessageA
ReleaseCapture
RemovePropA
LoadStringA
RemoveMenu
SetActiveWindow
SendMessageA
LoadBitmapA
RegisterClassA
PtInRect
MapVirtualKeyA
ReleaseDC
LoadCursorA
MessageBeep
RegisterClipboardFormatA
LoadKeyboardLayoutA
MapWindowPoints
OemToCharA
OpenClipboard
ScrollWindow
SendMessageW
ScreenToClient
gdi32
CreateFontIndirectA
CreatePenIndirect
CreateDIBitmap
SetPixel
SetTextColor
CreatePalette
CreateCompatibleBitmap
GetBitmapBits
oleaut32
RegisterTypeLib
GetErrorInfo
version
GetFileVersionInfoSizeA
kernel32
VirtualQuery
lstrcmpiA
lstrcpynA
ExitThread
GetVersionExA
lstrcmpA
VirtualAllocEx
IsBadReadPtr
WriteFile
WideCharToMultiByte
MulDiv
LocalFree
lstrcpyA
VirtualFree
lstrlenA
MoveFileA
SizeofResource
LocalReAlloc
lstrlenW
lstrcatA
GetModuleHandleW
LoadLibraryA
VirtualAlloc
WaitForSingleObject
GetModuleHandleA
ExitProcess
LocalAlloc
MoveFileExA
GetProcAddress
HeapDestroy
comctl32
ImageList_Write
ImageList_DragShowNolock
ImageList_Add
ImageList_Draw
ole32
CLSIDFromString
WriteClassStm
PropVariantClear
shell32
SHGetSpecialFolderLocation
SHFileOperationA
SHGetDiskFreeSpaceA
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 649B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc9 Size: 512B - Virtual size: 414B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc5 Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc2 Size: 1024B - Virtual size: 675B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc8 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc6 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ