Static task
static1
Behavioral task
behavioral1
Sample
2b83dc0b443c46d04374fe70d397166b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b83dc0b443c46d04374fe70d397166b.exe
Resource
win10v2004-20231215-en
General
-
Target
2b83dc0b443c46d04374fe70d397166b
-
Size
428KB
-
MD5
2b83dc0b443c46d04374fe70d397166b
-
SHA1
66a6545a132b8d4f89eef3464da4070487aca70e
-
SHA256
3a77f4c8207ee9f8e3dbab4c7e1970919c3174230dfe0f50c75ebd35dabcc70e
-
SHA512
f624f63d3a895e4c930048987935c980777a014775a2d16f7e7917c9c382e2a1de1d4f89117cf72e40ba33bbff97c5ccca1eafae9028f68817ba5ded91f257db
-
SSDEEP
12288:rciQfKkYNpzdsyyoNVWDmJqsSve7lT8BJz6VeKZLjkaVjw8wNEh740RVr9F9F8Vf:rLV6x2/bQoWaa3dMUP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b83dc0b443c46d04374fe70d397166b
Files
-
2b83dc0b443c46d04374fe70d397166b.exe windows:4 windows x86 arch:x86
f439f81d9f819a65faf8f095cc7212c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GlobalFindAtomA
WinExec
GlobalDeleteAtom
GlobalAddAtomA
GetTempPathA
GetShortPathNameA
lstrcpynA
lstrcatA
lstrcpyA
IsDBCSLeadByte
lstrlenA
FindFirstFileA
FindClose
GetTickCount
GetVersionExA
VirtualQuery
CloseHandle
CreateFileA
SetEnvironmentVariableA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
RaiseException
GetLocaleInfoW
GetTimeZoneInformation
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
FreeLibrary
LoadLibraryW
SetConsoleCtrlHandler
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
DebugBreak
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
WriteFile
VirtualFree
HeapCreate
HeapDestroy
IsBadReadPtr
HeapValidate
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetProcAddress
LoadLibraryA
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetLastError
GetCurrentThread
MultiByteToWideChar
CompareStringA
CompareStringW
IsDebuggerPresent
GetModuleFileNameW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
FlushFileBuffers
advapi32
RegOpenKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegQueryValueA
user32
CreateDialogParamA
SetWindowsHookA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHook
SetDlgItemTextA
GetSystemMetrics
SendMessageA
RegisterWindowMessageA
ShowWindow
DestroyWindow
PostQuitMessage
KillTimer
DialogBoxParamA
SetFocus
GetCursorPos
CreatePopupMenu
SetForegroundWindow
TrackPopupMenuEx
PostMessageA
DestroyMenu
CheckRadioButton
GetDlgItem
EnableWindow
EndDialog
IsDlgButtonChecked
SetTimer
LoadImageA
DrawIconEx
DestroyIcon
IsWindow
GetClassNameA
MessageBoxA
LoadStringA
InsertMenuA
CharNextA
wsprintfA
GetDoubleClickTime
shell32
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE