Static task
static1
Behavioral task
behavioral1
Sample
2b5a087513bc036c6b968cc07d165ef5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b5a087513bc036c6b968cc07d165ef5.exe
Resource
win10v2004-20231215-en
General
-
Target
2b5a087513bc036c6b968cc07d165ef5
-
Size
37KB
-
MD5
2b5a087513bc036c6b968cc07d165ef5
-
SHA1
001077aa7a2567ae4e19c6848cb38a558cd22e40
-
SHA256
46158162324498f4714c8f738c3de4c3f8699ff082407550e5f90ff960c6b632
-
SHA512
977375570918dadb87762a2f9414ba79b39a3b31708d6700a25f6060e63f541e90530b2b77d49c001fb203252e9c3de5c0b2ee43993970975fea9721a284a4e5
-
SSDEEP
384:2NJs/UJT14ESLW/0SHFpym4mlP7P8yJotbborjHEoK3aU:MZ14EP/0qpfDutbijHEoma
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b5a087513bc036c6b968cc07d165ef5
Files
-
2b5a087513bc036c6b968cc07d165ef5.exe windows:4 windows x86 arch:x86
bcf5b77aa058f55d1060153de4871d54
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
LoadLibraryA
WriteFile
GetLastError
SetFilePointer
CloseHandle
CreateFileA
ExitProcess
GetVersion
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameW
DeviceIoControl
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
GetModuleFileNameA
WideCharToMultiByte
VirtualAlloc
HeapReAlloc
FlushFileBuffers
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE