Static task
static1
Behavioral task
behavioral1
Sample
2fd087d3245dfc54b4e6899440387baa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2fd087d3245dfc54b4e6899440387baa.exe
Resource
win10v2004-20231215-en
General
-
Target
2fd087d3245dfc54b4e6899440387baa
-
Size
457KB
-
MD5
2fd087d3245dfc54b4e6899440387baa
-
SHA1
6f32ffa63555ab371de9b443d3df9e6efff51188
-
SHA256
109c2a85581acaa41153d4b172d3760fb01729cd5291fe5d125a1fd7bbe139ca
-
SHA512
5e89aeea1163d861b3eb7d9d0cc60ae82ed8a68c01b66104b10fd7b710939366bc0898cc0131f1218fa431c10c044f2e29f5d65371beead25059dbce84bc4959
-
SSDEEP
6144:0GQlMNmJuXMJbRt7+0G8EsRbNOxECHk1325OAolk4opSJw74MWcn+dff2vaAcgfm:0rIs/960GBscKDk4oEi4MhC6CJgrC
Malware Config
Signatures
Files
-
2fd087d3245dfc54b4e6899440387baa.exe windows:4 windows x86 arch:x86
7bb51576ef0331d5adbfd9de83cce813
Code Sign
61:3d:df:98:53:e1:c1:fe:f1:0d:f8:d3:8e:42:16:fd:68:c1:55:faSigner
Actual PE Digest61:3d:df:98:53:e1:c1:fe:f1:0d:f8:d3:8e:42:16:fd:68:c1:55:faDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
GetDefaultCommConfigA
GetVersionExA
LockResource
ExitProcess
VirtualAlloc
WriteFile
GetLastError
CreateFileMappingA
CloseHandle
GetTickCount
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
GetCommandLineA
GetStringTypeA
MultiByteToWideChar
GetVersion
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
SetFilePointer
GetSystemTimeAsFileTime
GetCommandLineW
GetModuleHandleW
lstrcmpiA
ReadFile
CreateThread
GetModuleHandleA
GetProcAddress
GetStringTypeW
LCMapStringA
LCMapStringW
LoadLibraryA
user32
IsIconic
GetDC
IsChild
RegisterClassW
GetSystemMetrics
InvalidateRect
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
MessageBoxA
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
SetScrollRange
CreateDialogParamA
LoadStringA
GetClientRect
DialogBoxParamA
CreateWindowExA
IsDialogMessageA
gdi32
ExcludeClipRect
CreatePen
Rectangle
GetDeviceCaps
SetBkColor
GetClipBox
CreatePenIndirect
TextOutW
advapi32
RegSetValueExW
RegCreateKeyExA
RegCloseKey
ole32
CoInitialize
CoTaskMemAlloc
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ