Static task
static1
Behavioral task
behavioral1
Sample
2a72f9ccc12e8210a6b41497735ce4f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a72f9ccc12e8210a6b41497735ce4f8.exe
Resource
win10v2004-20231222-en
General
-
Target
2a72f9ccc12e8210a6b41497735ce4f8
-
Size
49KB
-
MD5
2a72f9ccc12e8210a6b41497735ce4f8
-
SHA1
106898abcefb08117f8d5dc145288d433a044346
-
SHA256
e2a96f34a6cbbd9d901a52065912af7c62c233d10720468b17091bf5671aa437
-
SHA512
d967ce4cc17e797617cd95b27675d4c07acca2a4ac5ca7d7558fbf8867beaac3361df48d16f9b329035f57aaa167cdaee9a962334ec38dcd0272915525426291
-
SSDEEP
768:f3HvDOOb1b8FRktVfXiWy4PjVNxcvcZz4P4ZzF7HDyDaYvEIfsF8VpUsUfz:/iYbVfiWykAv+ZzJe0IkFG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a72f9ccc12e8210a6b41497735ce4f8
Files
-
2a72f9ccc12e8210a6b41497735ce4f8.exe windows:5 windows x86 arch:x86
35afc798607a7f5759cdecbff6a7ebb6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongW
GetCursorPos
GetDlgItemTextW
PeekMessageW
OpenWindowStationA
GetDlgItemTextA
CloseWindowStation
GetClipboardData
EndDialog
GetMessageA
GetDlgItem
GetIconInfo
GetWindowThreadProcessId
SendMessageW
DrawIcon
GetForegroundWindow
ToUnicode
LoadCursorW
SetProcessWindowStation
GetKeyState
GetKeyboardState
DispatchMessageW
PeekMessageA
MsgWaitForMultipleObjects
FindWindowExW
SetThreadDesktop
GetMessageW
GetWindowTextW
CloseDesktop
ExitWindowsEx
OpenDesktopA
CharLowerBuffA
GetClassNameW
kernel32
Sleep
SetFileAttributesW
WriteFile
IsBadReadPtr
GetThreadPriority
GetExitCodeProcess
ReadFile
GetModuleFileNameW
WaitForSingleObject
MoveFileExW
OpenMutexW
InitializeCriticalSection
SetFileTime
MultiByteToWideChar
FindResourceW
ExpandEnvironmentStringsW
FindFirstFileW
FindNextFileW
GlobalLock
lstrlenA
GetFileTime
GetModuleHandleA
CreateMutexW
CreateDirectoryW
UnmapViewOfFile
GetLastError
EnterCriticalSection
GetSystemTimeAsFileTime
HeapFree
GetUserDefaultUILanguage
GetDriveTypeW
GetTempFileNameW
lstrcatW
lstrcpyW
SetFilePointer
LeaveCriticalSection
ReleaseMutex
HeapAlloc
lstrlenW
CreateProcessW
OpenProcess
GetCurrentProcessId
lstrcpyA
DeleteFileW
CopyFileW
GetSystemTime
MapViewOfFile
GetCurrentThreadId
GetProcessHeap
lstrcmpiW
CreateFileMappingW
GetTimeZoneInformation
SystemTimeToFileTime
FindClose
SetEndOfFile
GetLocalTime
WriteProcessMemory
Sections
.vur Size: 38KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.axgp Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.psfmj Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ