Static task
static1
Behavioral task
behavioral1
Sample
2240f79bbfac61f1012dd68b3ed903e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2240f79bbfac61f1012dd68b3ed903e7.exe
Resource
win10v2004-20231215-en
General
-
Target
2240f79bbfac61f1012dd68b3ed903e7
-
Size
5.7MB
-
MD5
2240f79bbfac61f1012dd68b3ed903e7
-
SHA1
f4fb036cc2e3323bdefbb04e9035fbeca4419e6a
-
SHA256
77ff8efffd482505990b61ba491a9c24696640c9c0a92861b11d3c5c3483cb33
-
SHA512
0e2e8a86a743b7021bbf49f4dfe01132db48841640527fa0c72d9a7555c3f8dfa162fa2e1c1c54b013dcdfca178dc62fed0b33e47e16f6e13d8ecb2e147afb14
-
SSDEEP
98304:R1JFs7so18eJ/TQZrAD850CIdzk2HzPP3XTcBhouaFVqYpz/p65pf1/LBk:7JSQodJsRO8/IdnzcfhaGYH6TVW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2240f79bbfac61f1012dd68b3ed903e7
Files
-
2240f79bbfac61f1012dd68b3ed903e7.exe windows:4 windows x86 arch:x86
5f22bf5940f4e329764ce7019e3ea7e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAEventSelect
WSAConnect
gethostbyaddr
getsockopt
htonl
ole32
GetRunningObjectTable
CoTaskMemRealloc
CoImpersonateClient
CreateBindCtx
OleSave
OleSetClipboard
gdi32
FillPath
GetMetaFileBitsEx
GetEnhMetaFileDescriptionA
DeleteObject
CreateRoundRectRgn
user32
SetMenuItemBitmaps
MessageBoxA
CheckDlgButton
GetProcessDefaultLayout
ScrollWindow
LoadMenuIndirectW
GetMessagePos
CharUpperBuffA
GetClassNameW
PeekMessageA
OpenWindowStationW
UnhookWinEvent
GetWindowTextLengthA
ScreenToClient
SetProcessDefaultLayout
CreateIconIndirect
SetLastErrorEx
RegisterWindowMessageW
CreateDesktopA
SetCaretBlinkTime
CharNextA
CharNextExA
CopyAcceleratorTableA
OpenWindowStationA
kernel32
GetOEMCP
lstrcmpA
GetSystemDefaultLangID
SetThreadPriorityBoost
TlsGetValue
GetFullPathNameA
FreeResource
lstrcmpiW
GlobalFindAtomW
WritePrivateProfileStringW
lstrcpynA
LocalAlloc
FillConsoleOutputCharacterA
GetThreadContext
CreateDirectoryW
EnumResourceNamesA
VirtualProtect
SetMailslotInfo
GetDateFormatA
WriteConsoleOutputCharacterA
GetSystemTimeAsFileTime
SetThreadLocale
SetCurrentDirectoryA
VirtualUnlock
WritePrivateProfileStructA
CreateFileW
EnumTimeFormatsW
FreeLibrary
ReadConsoleInputW
UnhandledExceptionFilter
_lopen
PrepareTape
GetTickCount
OpenSemaphoreW
GetCommandLineW
lstrcpyA
GetEnvironmentVariableW
FatalAppExitA
ExitProcess
SearchPathW
RemoveDirectoryA
IsBadStringPtrA
_lclose
FormatMessageW
CreateMutexW
GetDriveTypeW
GetPrivateProfileStringA
RaiseException
EnumSystemCodePagesA
GetSystemTimeAdjustment
CreateWaitableTimerA
SetConsoleCursorPosition
OutputDebugStringA
RemoveDirectoryW
LoadLibraryExA
FindFirstFileA
CreateNamedPipeW
GetCurrentDirectoryW
EnumCalendarInfoW
EnumDateFormatsW
PulseEvent
EnumCalendarInfoA
ReadFile
GetProfileStringA
GetCommModemStatus
OutputDebugStringW
VirtualAllocEx
QueryDosDeviceA
GetTempPathW
SetEnvironmentVariableA
VirtualFree
EndUpdateResourceA
PurgeComm
GetVersion
CopyFileExW
SwitchToFiber
GetNumberFormatW
SetupComm
WriteProcessMemory
InitializeCriticalSection
EnumResourceLanguagesW
ReadFileScatter
VirtualQueryEx
GetDriveTypeA
GetWindowsDirectoryA
PeekNamedPipe
SetSystemTime
GlobalReAlloc
LeaveCriticalSection
LocalLock
SetThreadAffinityMask
GetCPInfo
_lread
MoveFileExA
GetTempFileNameA
SetConsoleActiveScreenBuffer
GenerateConsoleCtrlEvent
GetPrivateProfileSectionW
UnmapViewOfFile
Sections
.text Size: 2KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ