Static task
static1
Behavioral task
behavioral1
Sample
2eef3375591e3400e6e6ecb58275cac5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2eef3375591e3400e6e6ecb58275cac5.exe
Resource
win10v2004-20231215-en
General
-
Target
2eef3375591e3400e6e6ecb58275cac5
-
Size
209KB
-
MD5
2eef3375591e3400e6e6ecb58275cac5
-
SHA1
6d563b948c84228939d80c00606ebad2834fde5b
-
SHA256
c260ce336d98368336b821038633aa3cb62011d0876e46cdd93d07daaa2e2cb8
-
SHA512
ef862bb8d5c266741de55944d2ff7b863613a3bb0742d3f2f961f5012d59408f1cd846c8d30b8d69b1591297240b5bb5ba8db0fc99e9ac27ff67084e7fc9780c
-
SSDEEP
3072:AwA+s5e7S7I8h3jhLwQowwa6NLvdF2VzSPbIRVvNF58LLoUK749iHLV7lZC0FaqL:AvRce/h3jFRow3u9WbF5/74oV5ZnFa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2eef3375591e3400e6e6ecb58275cac5
Files
-
2eef3375591e3400e6e6ecb58275cac5.exe windows:4 windows x86 arch:x86
cec1de1211adc3a377b7740ccc65451c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetMalloc
CoDisconnectObject
CoCreateGuid
CreateBindCtx
CoFreeUnusedLibraries
CreateOleAdviseHolder
user32
RegisterWindowMessageA
UnhookWindowsHookEx
SetMenuItemInfoA
GetMenuItemCount
DefMDIChildProcA
TranslateMessage
SystemParametersInfoA
ClientToScreen
GetDesktopWindow
GetClassInfoA
DestroyCursor
EnumChildWindows
KillTimer
CheckMenuItem
SetForegroundWindow
DefWindowProcA
GetMenuItemID
IsZoomed
DispatchMessageA
SetCursor
FindWindowA
GetWindow
PostQuitMessage
IsWindowEnabled
SetWindowPlacement
RemoveMenu
ShowWindow
EnableMenuItem
RedrawWindow
CharLowerA
GetKeyboardLayoutNameA
GetDCEx
PostMessageA
MapWindowPoints
GetKeyNameTextA
SetActiveWindow
SetScrollInfo
SetTimer
CallNextHookEx
RegisterClipboardFormatA
wsprintfA
GetClientRect
SetWindowLongW
OpenClipboard
FillRect
CreateIcon
SendMessageA
IsWindow
InsertMenuA
CharUpperBuffA
RemovePropA
SetWindowTextA
SetClassLongA
GetKeyState
WaitMessage
LoadCursorA
EqualRect
LoadBitmapA
InsertMenuItemA
GetTopWindow
DestroyIcon
CreateWindowExA
GetKeyboardLayoutList
GetWindowTextA
WindowFromPoint
ChildWindowFromPoint
SetMenu
CharToOemA
InflateRect
MessageBeep
GetWindowThreadProcessId
DrawFrameControl
DefFrameProcA
GetCursor
MoveWindow
IsRectEmpty
GetWindowLongA
GetKeyboardLayout
UpdateWindow
GetScrollPos
CharLowerBuffA
EnumWindows
GetClassNameA
CloseClipboard
PeekMessageW
EnableScrollBar
ReleaseCapture
LoadIconA
GetLastActivePopup
PtInRect
EnumThreadWindows
AdjustWindowRectEx
BeginPaint
CharNextW
GetClipboardData
UnregisterClassA
OemToCharA
GetScrollRange
GetCursorPos
LoadKeyboardLayoutA
GetWindowLongW
GetSysColor
IntersectRect
EndPaint
SetRect
SetFocus
DeleteMenu
ShowOwnedPopups
SetClipboardData
SetScrollRange
SendMessageW
SetScrollPos
ReleaseDC
GetMenu
GetDlgItem
CallWindowProcA
IsWindowVisible
DrawTextA
DestroyMenu
GetWindowRect
GetActiveWindow
GetSubMenu
GetMenuItemInfoA
ScreenToClient
SetCapture
GetClassLongA
GetPropA
EmptyClipboard
GetMessagePos
GetSystemMenu
GetKeyboardType
IsIconic
GetFocus
FrameRect
SetParent
SetWindowsHookExA
GetMenuStringA
IsDialogMessageW
CharNextA
TranslateMDISysAccel
InvalidateRect
MessageBoxA
CreatePopupMenu
GetCapture
RegisterClassA
IsWindowUnicode
DrawIconEx
DestroyWindow
GetWindowDC
TrackPopupMenu
GetForegroundWindow
shlwapi
SHDeleteValueA
SHSetValueA
SHStrDupA
PathIsContentTypeA
PathFileExistsA
SHEnumValueA
PathIsDirectoryA
SHQueryInfoKeyA
PathGetCharTypeA
SHDeleteKeyA
advapi32
RegEnumKeyExA
RegEnumValueA
shell32
Shell_NotifyIconA
msvcrt
time
log
gdi32
CreateDIBitmap
CreateFontIndirectA
CreatePenIndirect
CreatePalette
GetBitmapBits
oleaut32
SysStringLen
VariantChangeType
RegisterTypeLib
SysReAllocStringLen
SafeArrayCreate
SafeArrayUnaccessData
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
FindTextA
ChooseColorA
kernel32
GetModuleHandleA
VirtualAlloc
GetCommandLineA
GetVersionExA
ExitProcess
GetLastError
GetCommandLineW
ExitThread
IsBadReadPtr
GlobalAlloc
lstrlenA
LoadLibraryA
GetACP
GetProcAddress
version
VerInstallFileA
GetFileVersionInfoSizeA
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 689B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 512B - Virtual size: 501B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc4 Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc8 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc1 Size: 512B - Virtual size: 438B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc9 Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ