Static task
static1
Behavioral task
behavioral1
Sample
2077e74154e03917dfd83e1d1b3ea3fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2077e74154e03917dfd83e1d1b3ea3fc.exe
Resource
win10v2004-20231215-en
General
-
Target
2077e74154e03917dfd83e1d1b3ea3fc
-
Size
3.0MB
-
MD5
2077e74154e03917dfd83e1d1b3ea3fc
-
SHA1
d40802db64ea9087541d469ec89361fd7c343fe6
-
SHA256
d620e22f1ebf5e39e6671fbb877683defc9e97a3a08eacd265e4da3b84b547ec
-
SHA512
87dbb336203fe3b1465c88ccbc49f3244c003102f55b38caf8efb019e64eaf477f8bbbb3103cebc5774e89dfd52f135688467000f9f73d31486d347debf22ec4
-
SSDEEP
49152:4HZ2s3FMX+i9crDcRLsDENLuYP6Tbs6bGEHXXueUGnkUmKGXvhGMB/U/8KiV000/:4l3FMui9wE4YNyYCTXbNHXXueUGnkUmK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2077e74154e03917dfd83e1d1b3ea3fc
Files
-
2077e74154e03917dfd83e1d1b3ea3fc.exe windows:5 windows x86 arch:x86
18e8ecf05e66e76f547843ef4e7a6230
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
msacm32
acmMetrics
msvcrt
__getmainargs
_except_handler3
islower
isprint
ispunct
isspace
isupper
isxdigit
memcmp
memcpy
memmove
memset
strchr
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_acmdln
exit
_XcptFilter
_exit
toupper
tolower
strncmp
strlen
comctl32
ImageList_DragShowNolock
InitializeFlatSB
ord17
ImageList_Write
ImageList_SetOverlayImage
ImageList_SetIconSize
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Replace
ImageList_SetImageCount
FlatSB_SetScrollProp
ImageList_Add
ImageList_BeginDrag
ImageList_Copy
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_LoadImageW
ImageList_Read
ImageList_Remove
version
VerQueryValueW
kernel32
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
GlobalFree
HeapFree
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockFile
LockResource
lstrlenW
MapViewOfFile
MoveFileExW
MoveFileW
MulDiv
MultiByteToWideChar
OpenProcess
OutputDebugStringW
PeekNamedPipe
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
RemoveDirectoryW
ResetEvent
ResumeThread
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetThreadLocale
SetThreadPriority
SetVolumeLabelW
SizeofResource
SuspendThread
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
VirtualQueryEx
WaitForMultipleObjectsEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
IsValidCodePage
GetCommandLineA
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GlobalFindAtomW
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomW
GetWindowsDirectoryW
GetVolumeInformationW
GetUserDefaultLCID
GetTimeZoneInformation
GetTickCount
GetThreadPriority
GetThreadLocale
GetTempPathW
GetTempFileNameW
GetSystemInfo
GetSystemDefaultLCID
GetStringTypeExW
GetStringTypeExA
GetStdHandle
GetStartupInfoW
GetProcAddress
GetPrivateProfileStringW
GetOverlappedResult
GetModuleHandleW
GetModuleFileNameW
GetLongPathNameW
GetLogicalDriveStringsW
GetLocalTime
GetLocaleInfoW
GetLastError
GetFullPathNameW
GetFileType
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetExitCodeThread
GetExitCodeProcess
GetEnvironmentVariableW
GetDriveTypeW
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentDirectoryW
GetCPInfoExW
GetConsoleOutputCP
GetConsoleCP
GetComputerNameW
GetCommandLineW
GetACP
FreeResource
FormatMessageW
FlushFileBuffers
FindResourceW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
EnumSystemLocalesW
EnumResourceNamesW
EnumCalendarInfoW
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileW
DeleteCriticalSection
CreateThread
CreateProcessW
CreatePipe
CreateFileW
CreateFileMappingW
CreateEventW
ExitProcess
GetOEMCP
HeapDestroy
user32
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropW
ScreenToClient
ScrollWindow
SendMessageA
SendMessageW
SetActiveWindow
SetCapture
SetClassLongW
SetClipboardData
SetCursorPos
SetFocus
SetForegroundWindow
SetMenuItemInfoW
SetParent
SetPropW
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowCaret
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UpdateWindow
WaitMessage
WindowFromPoint
RegisterClassW
RedrawWindow
PostThreadMessageW
PostQuitMessage
PostMessageW
PeekMessageW
PeekMessageA
OpenClipboard
OemToCharBuffA
OemToCharA
MsgWaitForMultipleObjectsEx
MessageBoxW
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyW
LoadStringW
LoadKeyboardLayoutW
LoadIconW
LoadCursorW
LoadBitmapW
KillTimer
IsZoomed
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsIconic
IsDialogMessageW
IsDialogMessageA
IsChild
InvalidateRect
InsertMenuW
InsertMenuItemW
HideCaret
GetWindowThreadProcessId
GetWindowTextW
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropW
GetParent
GetMessageW
GetMessageTime
GetMessagePos
GetMessageExtraInfo
GetMenuStringW
GetMenuState
GetMenuItemInfoW
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextW
GetKeyboardState
GetKeyboardLayoutNameW
GetKeyboardLayoutList
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgCtrlID
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameW
GetClassLongW
GetClassInfoW
GetClassInfoExW
GetCapture
GetActiveWindow
FrameRect
FindWindowW
FindWindowExW
FillRect
EnumWindows
EnumThreadWindows
EnumChildWindows
EnableWindow
EnableScrollBar
EmptyClipboard
DrawTextW
DrawTextExW
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcW
DefMDIChildProcW
DefFrameProcW
CreateWindowExW
CreatePopupMenu
CreateMenu
CreateIcon
CreateAcceleratorTableW
CopyImage
CopyIcon
CloseClipboard
ClientToScreen
CheckMenuItem
CharUpperW
CharUpperBuffW
CharUpperBuffA
CharToOemBuffA
CharToOemA
CharNextW
CharLowerW
CharLowerBuffW
GetSysColor
EnableMenuItem
gdi32
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
GetEnhMetaFileDescriptionW
GetEnhMetaFileBits
GetDIBits
GetDIBColorTable
GetDeviceCaps
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetPaletteEntries
PatBlt
Pie
PlayEnhMetaFile
PolyBezierTo
Polygon
Polyline
RealizePalette
Rectangle
RectVisible
RestoreDC
RoundRect
SaveDC
SelectObject
SelectPalette
SetAbortProc
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetDIBits
SetEnhMetaFileBits
SetMapMode
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocW
StartPage
StretchBlt
StretchDIBits
UnrealizeObject
MaskBlt
LPtoDP
LineTo
GetBitmapBits
GdiFlush
FrameRgn
ExtTextOutW
ExtFloodFill
ExcludeClipRect
EnumFontsW
EnumFontFamiliesExW
EndPage
EndDoc
Ellipse
DeleteObject
DeleteEnhMetaFile
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePenIndirect
CreatePalette
CreateICW
CreateHalftonePalette
CreateFontIndirectW
CreateEnhMetaFileW
CreateDIBSection
CreateDIBitmap
CreateDCW
GetObjectW
CreateCompatibleDC
IntersectClipRect
GetWinMetaFileBits
GetWindowOrgEx
GetTextMetricsW
GetTextExtentPointW
GetTextExtentPoint32W
GetSystemPaletteEntries
GetStockObject
GetRgnBox
GetPixel
MoveToEx
winspool.drv
OpenPrinterW
advapi32
SetServiceStatus
ReportEventW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegLoadKeyW
RegisterServiceCtrlHandlerW
RegisterEventSourceW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegConnectRegistryW
RegCloseKey
OpenServiceW
OpenSCManagerW
StartServiceCtrlDispatcherW
ole32
ProgIDFromCLSID
StringFromCLSID
OleSetMenuDescriptor
CoGetMalloc
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CreateStreamOnHGlobal
IsAccelerator
OleDraw
OleInitialize
OleRegEnumVerbs
OleUninitialize
oleaut32
VariantCopyInd
VariantClear
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SafeArrayUnaccessData
SysAllocString
SysAllocStringLen
SysFreeString
SysReAllocStringLen
SafeArrayGetElement
SysStringByteLen
VariantInit
VariantChangeType
ws2_32
WSAGetLastError
WSACleanup
socket
WSAStartup
setsockopt
sendto
select
recvfrom
shutdown
gethostbyname
listen
ioctlsocket
inet_addr
htons
getsockopt
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ