Static task
static1
Behavioral task
behavioral1
Sample
2826da09d12953f75a1b13444a03dfe9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2826da09d12953f75a1b13444a03dfe9.exe
Resource
win10v2004-20231215-en
General
-
Target
2826da09d12953f75a1b13444a03dfe9
-
Size
4.5MB
-
MD5
2826da09d12953f75a1b13444a03dfe9
-
SHA1
1f183b86f9140fa54ae3bef9862aeea3e33cb289
-
SHA256
523119cba40fc37d1999ba51850376130233091c6ed74a0832dbbced9799b154
-
SHA512
6ede86948f99e6dc2c02b8831e90727ad9fc99c4d96a54e101282a55b22d5e9b53925f9e689cd6f957e77021fafbf1365d9cdcc850587c789b4a502b38261a02
-
SSDEEP
98304:hjX2TR/+9g+1wLgJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk8411bFmL1OVYIl:c1+vJiPD3Nm7AJEgLYX8CNYzQEr0WO01
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2826da09d12953f75a1b13444a03dfe9
Files
-
2826da09d12953f75a1b13444a03dfe9.exe windows:4 windows x86 arch:x86
490b83949e585fc6504fdb8a60bc993a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrlenA
Sleep
GetFileSize
ReadFile
SetFilePointer
DuplicateHandle
GetModuleHandleA
MultiByteToWideChar
TerminateThread
OpenProcess
IsBadReadPtr
SetLastError
GetVersionExA
FreeLibrary
WaitForSingleObject
ResumeThread
SetThreadContext
GetThreadContext
CreateEventA
SuspendThread
CopyFileA
GetSystemTime
FindClose
FindNextFileA
FindFirstFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetSystemDefaultLangID
lstrcpyW
lstrlenW
CreateProcessA
MoveFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryW
InitializeCriticalSection
GetLastError
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
UnhandledExceptionFilter
HeapAlloc
TlsAlloc
GetCurrentThreadId
RaiseException
ExitProcess
GetVersion
UnmapViewOfFile
LoadLibraryA
GetProcAddress
CreateFileA
WriteFile
GetCurrentDirectoryA
GetCurrentProcessId
GetSystemDirectoryA
SetFileAttributesA
GetModuleFileNameA
VirtualProtect
VirtualAlloc
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
CloseHandle
GetCurrentProcess
TerminateProcess
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
GetLocalTime
GetTimeZoneInformation
ExitThread
TlsGetValue
TlsSetValue
CreateThread
VirtualFree
lstrcpyA
CreateFileMappingA
MapViewOfFile
user32
EndDialog
MessageBoxA
GetWindowThreadProcessId
SystemParametersInfoA
GetWindow
GetClassNameA
IsWindow
GetTopWindow
IsWindowVisible
FindWindowA
GetWindowTextA
wsprintfA
LoadIconA
CheckDlgButton
EnableWindow
SetDlgItemTextA
GetDlgItemTextA
GetClassNameW
IsDlgButtonChecked
GetKeyboardLayoutNameA
GetKeyboardLayoutList
UnloadKeyboardLayout
ReleaseCapture
ClientToScreen
SetCursor
SetCapture
LoadBitmapA
LoadCursorA
WindowFromPoint
GetParent
PtInRect
GetWindowDC
GetWindowRect
OffsetRect
IsRectEmpty
ReleaseDC
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
WaitForInputIdle
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
GetDlgItem
gdi32
PatBlt
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
shell32
ShellExecuteExA
ShellExecuteA
ws2_32
inet_addr
htons
connect
send
select
closesocket
socket
inet_ntoa
gethostbyname
WSAStartup
recv
__WSAFDIsSet
imm32
ImmGetDescriptionA
ImmIsIME
shlwapi
PathFindExtensionA
PathRemoveFileSpecA
PathFileExistsA
PathFindFileNameA
StrCatW
PathRenameExtensionA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 1020KB - Virtual size: 1018KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ