Static task
static1
Behavioral task
behavioral1
Sample
2a366b12051de726d11d1754210381b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a366b12051de726d11d1754210381b1.exe
Resource
win10v2004-20231215-en
General
-
Target
2a366b12051de726d11d1754210381b1
-
Size
324KB
-
MD5
2a366b12051de726d11d1754210381b1
-
SHA1
d97b10bc4350995ef4d37bb6188ec43b736e4d7e
-
SHA256
29e88c432c5e61eafa7fe2845961a3ee4d46a92eef186c727cbd42335dbd25a9
-
SHA512
d54dd8855a59dddb0e766300d0adb51c2123a13cf11c272871301ae244f41146a57bac06f1f5940904030647c741b08a4b8ed6562716110d3a8042a3ecd75f24
-
SSDEEP
3072:Q98FTCKIzCv2GSllHzuYySoz2z6wSb43rknmLr1i1JGZs49koDvjvGPhNjlPtqWa:I8Uz42Gk7XGQOJVIvzBWurIvz/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a366b12051de726d11d1754210381b1
Files
-
2a366b12051de726d11d1754210381b1.exe windows:4 windows x86 arch:x86
3dcad518ad5efd5a3143b2eacea98a95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
SHDeleteKeyA
SHGetValueA
SHDeleteValueA
SHSetValueA
kernel32
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
InterlockedDecrement
lstrlenA
MoveFileExA
SetFileAttributesA
GetFileSize
ReadFile
SetFilePointer
Sleep
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetTempPathA
GetFileAttributesA
GetSystemDirectoryA
GetFileAttributesExA
GetLogicalDrives
GetTickCount
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateDirectoryA
GetWindowsDirectoryA
DeviceIoControl
lstrcpyA
InterlockedIncrement
lstrcmpiA
CompareStringA
FlushInstructionCache
GetCommandLineA
LoadLibraryW
GetLastError
MultiByteToWideChar
GetCurrentProcess
EnterCriticalSection
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
UnhandledExceptionFilter
SetLastError
TlsAlloc
LCMapStringW
LCMapStringA
CloseHandle
WideCharToMultiByte
HeapSize
HeapReAlloc
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
GetModuleHandleA
RtlUnwind
HeapAlloc
HeapFree
ExitThread
TlsGetValue
TlsSetValue
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
GetCurrentThreadId
FreeLibrary
DeleteFileA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
CreateThread
ResumeThread
user32
SetCapture
DialogBoxParamA
GetActiveWindow
CallWindowProcA
IsWindowEnabled
GetSysColor
GetFocus
DrawFocusRect
FillRect
GetDlgCtrlID
CreateWindowExA
DrawTextA
ReleaseDC
GetClassNameA
SetWindowLongA
CreateCursor
GetWindowTextLengthA
GetWindowTextA
GetDC
OffsetRect
CharNextA
EndPaint
LoadStringA
InvalidateRect
PtInRect
SetCursor
UpdateWindow
SetFocus
BeginPaint
GetCapture
ReleaseCapture
GetCursorPos
ScreenToClient
IsWindow
DestroyCursor
GetWindowLongA
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
SetRectEmpty
DestroyWindow
GetTopWindow
MessageBoxA
SetWindowTextA
GetSystemMetrics
LoadImageA
SendMessageA
GetDlgItem
EndDialog
EnableWindow
DefWindowProcA
gdi32
SetTextColor
DeleteDC
GetStockObject
GetObjectA
CreateFontIndirectA
SelectObject
DeleteObject
SetBkMode
advapi32
QueryServiceStatus
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StartServiceA
shell32
ShellExecuteExA
ShellExecuteA
ole32
CoInitialize
CoUninitialize
comctl32
InitCommonControlsEx
_TrackMouseEvent
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 236KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ