Static task
static1
Behavioral task
behavioral1
Sample
2233ba62c7e746eecf2c983b8c3e8d4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2233ba62c7e746eecf2c983b8c3e8d4c.exe
Resource
win10v2004-20231215-en
General
-
Target
2233ba62c7e746eecf2c983b8c3e8d4c
-
Size
424KB
-
MD5
2233ba62c7e746eecf2c983b8c3e8d4c
-
SHA1
81b450a6de4197f8f55182ede0852a8b1e3b94a7
-
SHA256
36b35dce6cf3e9bedda71c8ff583ce99e08d38b3a0f22af0adbcb2cf5de30c37
-
SHA512
0d1994b037275330fa73c32646b9edd4f481f3d22582e8036e1e40279c0ca39ab31f39866710df30a621de76578d42388bea017575b4c2c2f46fc393319bd396
-
SSDEEP
6144:C9AmcypSXaS5UOUdLdCJ9z5CR6wyK+lZlc3G0B/FaNN/ws8vnbUumaXxLcatV+qK:CJcVbRUDy9A3W43G0lF/vnbUNahLc8U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2233ba62c7e746eecf2c983b8c3e8d4c
Files
-
2233ba62c7e746eecf2c983b8c3e8d4c.exe windows:4 windows x86 arch:x86
8b061cbe912ca8c7ed3fa06e964d090e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleTitleA
LeaveCriticalSection
GenerateConsoleCtrlEvent
UpdateResourceW
GetStartupInfoW
ExitProcess
OpenSemaphoreW
AddAtomA
MoveFileExW
FreeEnvironmentStringsA
GetCommTimeouts
FoldStringA
lstrcpynW
OutputDebugStringA
FillConsoleOutputCharacterW
IsBadStringPtrW
lstrcmpW
IsProcessorFeaturePresent
VirtualAlloc
GetTimeZoneInformation
CreateMutexW
SetConsoleNumberOfCommandsW
PeekNamedPipe
GetNamedPipeHandleStateA
VirtualFreeEx
DeleteFiber
TransactNamedPipe
GetVersion
ReadConsoleW
LoadLibraryA
GetModuleHandleA
HeapUnlock
GetDriveTypeW
GetDiskFreeSpaceExA
GetCommandLineW
GetThreadSelectorEntry
GetStartupInfoA
GlobalSize
GlobalAddAtomA
VirtualAllocEx
VirtualFree
lstrcmpiW
lstrcatA
Sleep
GetConsoleInputExeNameA
SetConsoleFont
CreateDirectoryExA
WriteConsoleA
gdi32
StartDocW
GetEnhMetaFileDescriptionW
FixBrushOrgEx
GetMetaRgn
GetWindowExtEx
GetPixelFormat
CreatePolygonRgn
CreateSolidBrush
CreateMetaFileA
GetTextColor
GetPolyFillMode
GetCharWidthFloatW
GetMiterLimit
DPtoLP
GetBkMode
CreateDCA
PolyBezierTo
GetTextCharset
EnumFontFamiliesA
GetNearestColor
ScaleViewportExtEx
GetEnhMetaFileBits
PolyDraw
CreateFontIndirectA
SetICMMode
GetTextCharacterExtra
GetCurrentObject
user32
CharToOemW
DlgDirSelectComboBoxExW
AttachThreadInput
GetComboBoxInfo
GetDlgItemTextW
CopyIcon
EqualRect
AnyPopup
msvcrt
_fputwchar
__p___argc
_strnset
_onexit
_read
sscanf
wcsncat
_lseek
_adj_fpatan
_wmkdir
gmtime
_wcsncoll
_chmod
_execv
_callnewh
fwscanf
_wcsnicmp
__setusermatherr
_aexit_rtn
_adj_fdivr_m64
_ismbslead
div
_HUGE
__p__winver
_purecall
_mktemp
getwchar
putwc
__setlc_active
_ismbbkalnum
__RTtypeid
_adj_fprem
_mbctoupper
Sections
.text Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dqdd Size: 238KB - Virtual size: 455KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nxa Size: 177KB - Virtual size: 506KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ