Static task
static1
Behavioral task
behavioral1
Sample
2a601444b86e635bdc1e859274c38252.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a601444b86e635bdc1e859274c38252.exe
Resource
win10v2004-20231215-en
General
-
Target
2a601444b86e635bdc1e859274c38252
-
Size
21KB
-
MD5
2a601444b86e635bdc1e859274c38252
-
SHA1
7a1e02439261824f5762e115fc4516ebf81ad14c
-
SHA256
ed8b9a9b2dbaeda6dde8bc2cd42d2f6e7636b76882dd654404bc8cb4d23a49b2
-
SHA512
735c896a57b44d2858e312c60eb15045b97ec9ea37b941d3a62b63af078edf37085f8f0c641d93cdd13b3b39321f0ff33719b9996f4ec72b2767b286f28317db
-
SSDEEP
384:iteXY2kO9oxP9HCtR2yZYHtSZXpasunUxrfyEuJhb8LUp6I0hTWNK/F44kdbx5Jo:q9BOZgWQurCL8LU2F4fDEI6SZ2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a601444b86e635bdc1e859274c38252
Files
-
2a601444b86e635bdc1e859274c38252.exe windows:4 windows x86 arch:x86
7fd87ca6b1ac4a14e8ed2e54dc47c9bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetModuleHandleA
Sleep
lstrlenA
GetTickCount
GetStartupInfoA
user32
FillRect
LoadIconA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
LoadCursorA
MessageBoxA
DefWindowProcA
wsprintfA
GetClientRect
LoadBitmapA
GetDC
ReleaseDC
DestroyWindow
BeginPaint
EndPaint
PostQuitMessage
SetTimer
gdi32
SelectObject
CreateSolidBrush
SetTextColor
TextOutA
BitBlt
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SetBkMode
ole32
CoInitialize
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
msvcrt
sprintf
getenv
malloc
strcmp
__CxxFrameHandler
_EH_prolog
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
??2@YAPAXI@Z
_stricmp
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memmove
memset
strcpy
rand
srand
_except_handler3
memcpy
strlen
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ