Static task
static1
Behavioral task
behavioral1
Sample
2fd5b47edcc2fb21530b8187472a1fad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2fd5b47edcc2fb21530b8187472a1fad.exe
Resource
win10v2004-20231215-en
General
-
Target
2fd5b47edcc2fb21530b8187472a1fad
-
Size
158KB
-
MD5
2fd5b47edcc2fb21530b8187472a1fad
-
SHA1
1ea15fe6cdfcf9335838dbcd1f3b1af4edf59719
-
SHA256
73ff8486a49ee186f289cc5705ed591514812922977525d920fefcfe5624b3c3
-
SHA512
b98c1c094ac52518e745173e6435e3d74ff5bcd1247e1ca0371a0a03918501371870c6534a28ecbef73c70b2afb0129af12e1b125057e5d0fef52de989c1cc96
-
SSDEEP
3072:DjNOuolh+e3SFOqkcX9qcvnN9yPJjOJatNBTB1gTSdxF2sO:nk/3SRDqsn7ykaNB1mTa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fd5b47edcc2fb21530b8187472a1fad
Files
-
2fd5b47edcc2fb21530b8187472a1fad.exe windows:4 windows x86 arch:x86
2aa38881b8905edfbc6ff54778052a91
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetCapture
GetClassInfoA
SetScrollRange
FindWindowA
DestroyCursor
SetWindowLongA
ReleaseDC
GetMessagePos
UnregisterClassA
DrawIconEx
SystemParametersInfoA
SendMessageA
InflateRect
DeleteMenu
GetActiveWindow
CharNextW
ChildWindowFromPoint
CloseClipboard
GetKeyboardType
SetRect
GetClassNameA
CreateIcon
BeginPaint
EqualRect
GetScrollPos
ReleaseCapture
InvalidateRect
GetWindow
LoadBitmapA
GetMenu
GetTopWindow
GetMenuItemCount
advapi32
RegCreateKeyExA
RegEnumValueA
comdlg32
GetFileTitleA
gdi32
SetTextColor
GetDIBColorTable
shell32
SHGetDesktopFolder
kernel32
SetHandleCount
GetEnvironmentStrings
GetProcessHeap
HeapDestroy
WideCharToMultiByte
SetEndOfFile
GlobalAlloc
GetDiskFreeSpaceA
FindFirstFileA
LocalFree
LoadLibraryA
VirtualAllocEx
CreateThread
GetThreadLocale
ExitThread
SizeofResource
WaitForSingleObject
DeleteCriticalSection
ExitProcess
GetCurrentProcessId
CreateFileA
lstrcpyA
ReadFile
GetStartupInfoA
VirtualQuery
WriteFile
GetStdHandle
VirtualAlloc
GetProcAddress
GetLocaleInfoA
SetThreadLocale
GetCurrentThread
LockResource
GetFileType
GetCPInfo
GetLastError
MulDiv
GetFileAttributesA
DeleteFileA
GetModuleHandleA
LoadResource
RaiseException
SetEvent
CloseHandle
LoadLibraryExA
LocalReAlloc
lstrlenA
shlwapi
SHSetValueA
PathIsContentTypeA
SHQueryValueExA
PathGetCharTypeA
PathIsDirectoryA
PathFileExistsA
SHDeleteKeyA
msvcrt
calloc
tan
swprintf
strcmp
acos
abs
memcpy
oleaut32
SafeArrayGetUBound
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 124KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE