Static task
static1
Behavioral task
behavioral1
Sample
2d3c0ca801c75ed3894bfca49c574783.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d3c0ca801c75ed3894bfca49c574783.exe
Resource
win10v2004-20231222-en
General
-
Target
2d3c0ca801c75ed3894bfca49c574783
-
Size
161KB
-
MD5
2d3c0ca801c75ed3894bfca49c574783
-
SHA1
8d3fa975cb308f973f540a83f176ffae32412f4a
-
SHA256
e48a2f31d72a084f04cea6fe1220aa727f116bda24eaabcda3ee547b7d5de418
-
SHA512
5433a821affcb2e91b1565e3a6edc4feae9b6f39ef5ec3d64bdec1d962ca1efc4a2bce0e2c488bbf623d84d44fc16a81a22b4de56a29531a14dc9bede4ed5be0
-
SSDEEP
3072:xTgGZFxt5a5OwbAAT32C3cWLGyK3ytZVcAJoo3suAm/bK5eLsx24SGImOktby2P:+wtoNbAAb2CBvTZeBKjfb0eLsk7optbX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d3c0ca801c75ed3894bfca49c574783
Files
-
2d3c0ca801c75ed3894bfca49c574783.exe windows:4 windows x86 arch:x86
87b89eebc1209d709e816c25a54dca73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ole32
OleInitialize
CoCreateInstance
OleUninitialize
CoTaskMemFree
gdi32
SetBkMode
GetDeviceCaps
CreateBrushIndirect
CreateFontIndirectW
DeleteObject
SetTextColor
SelectObject
SetBkColor
advapi32
RegEnumValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyW
user32
LoadBitmapW
SetForegroundWindow
SetTimer
CharUpperW
RegisterClassW
SystemParametersInfoW
EndDialog
ShowWindow
EmptyClipboard
GetDlgItemTextW
InvalidateRect
GetDlgItem
EndPaint
SetWindowLongW
ExitWindowsEx
DialogBoxParamW
EnableMenuItem
CloseClipboard
OpenClipboard
SetClipboardData
CreatePopupMenu
wsprintfW
GetMessagePos
GetClassInfoW
GetClientRect
PostQuitMessage
GetDC
MessageBoxIndirectW
BeginPaint
SetCursor
FillRect
FindWindowExW
PeekMessageW
DefWindowProcW
CheckDlgButton
EnableWindow
IsWindowVisible
CreateDialogParamW
wsprintfA
LoadCursorW
IsWindowEnabled
GetWindowRect
GetSystemMenu
SetClassLongW
SendMessageTimeoutW
CharNextA
SetWindowPos
SetDlgItemTextW
DestroyWindow
IsWindow
CallWindowProcW
TrackPopupMenu
AppendMenuW
LoadImageW
GetWindowModuleFileNameW
SetWindowTextW
GetSysColor
DrawTextW
GetSystemMetrics
CreateWindowExW
DispatchMessageW
CharNextW
CharPrevW
SendMessageW
ScreenToClient
kernel32
lstrcmpiW
MultiByteToWideChar
CreateProcessW
lstrcatW
GlobalAlloc
WriteConsoleInputVDMA
GlobalLock
WriteFile
SetFilePointer
SetCurrentDirectoryW
GetFileSize
FindFirstFileW
GlobalUnlock
lstrcmpiA
GetLastError
GetExitCodeProcess
lstrcmpW
lstrlenW
GlobalFree
CreateDirectoryW
SetFileAttributesW
WideCharToMultiByte
GetTempFileNameW
LoadLibraryExW
lstrcpyW
GetProcessHandleCount
GetFileAttributesW
GetWindowsDirectoryW
GetModuleFileNameW
Sleep
WritePrivateProfileStringW
FreeLibrary
GetTempPathW
RemoveDirectoryW
FindNextFileW
MulDiv
EnumResourceNamesA
lstrcpyA
OpenProcess
WaitForSingleObject
GetFullPathNameW
GetPrivateProfileStringW
CreateFileW
ExitProcess
GetTickCount
GetVersionExW
DeleteFileW
LoadLibraryW
GetCurrentProcess
lstrcpynW
GetModuleHandleW
FreeEnvironmentStringsW
CompareFileTime
lstrlenA
ReadFile
CreateThread
CopyFileW
MoveFileW
GetModuleHandleA
GetVersion
GetCommandLineW
SearchPathW
FindClose
ExpandEnvironmentStringsW
GetProcAddress
GetSystemDirectoryW
SetErrorMode
GetShortPathNameW
GetDiskFreeSpaceW
LoadLibraryA
CloseHandle
lstrcpynA
SetFileTime
comctl32
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
oleacc
LresultFromObject
CreateStdAccessibleObject
shell32
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHFileOperationW
SHBrowseForFolderW
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idive Size: 1024B - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ