Static task
static1
Behavioral task
behavioral1
Sample
2ad9b838020582a2fe94f018c37ccebe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ad9b838020582a2fe94f018c37ccebe.exe
Resource
win10v2004-20231215-en
General
-
Target
2ad9b838020582a2fe94f018c37ccebe
-
Size
17KB
-
MD5
2ad9b838020582a2fe94f018c37ccebe
-
SHA1
dc4d14c76464eb4529bf5cf29240eb027b2ff163
-
SHA256
d3a66c3a776a29750d9282fd1a280601b8c69f7c7a6addccf5036d22f195f3ff
-
SHA512
c811a1573035145c272ad7109d7f6fcbad5ecce3b22ca22eb7fa95e8d2f710a6e3af084584cea33d5c145b8cd7f0ba14153b9915ebf52b740698a54e2cea7589
-
SSDEEP
384:QENbJ7wc0Uj/5wMxO9OF/8b00VbY9NtTxY6Y:QKbJ7AUNCeobY9fTxY6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ad9b838020582a2fe94f018c37ccebe
Files
-
2ad9b838020582a2fe94f018c37ccebe.exe windows:4 windows x86 arch:x86
af88e1ba2835fd75de9c036439c7a5f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5302
ord2396
ord4079
ord4698
ord5307
ord5300
ord3346
ord2725
ord5289
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord5714
ord2976
ord3922
ord2982
ord5199
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord1168
ord1146
ord4919
ord4975
ord4863
ord4335
ord4447
ord2032
ord5482
ord791
ord4779
ord5811
ord1089
ord3830
ord2554
ord815
ord5731
ord2512
ord4274
ord4486
ord6375
ord3780
ord1247
ord540
ord5207
ord800
ord389
ord823
ord2077
ord2029
ord3717
ord825
ord523
ord5479
ord967
ord1995
ord3831
ord5797
ord3825
ord3081
ord5308
ord1576
msvcrt
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
__p__fmode
_initterm
__getmainargs
__p__acmdln
_XcptFilter
_exit
_onexit
__dllonexit
time
exit
strcat
strrchr
_findfirst
_findnext
__p__commode
memmove
strcpy
fgetc
fputc
_EH_prolog
__CxxFrameHandler
fwrite
fseek
memset
fclose
_findclose
fopen
strchr
atoi
sprintf
strncat
strlen
strstr
fgets
fread
_access
_setmbcp
kernel32
Sleep
SearchPathA
CreateFileA
SetCurrentDirectoryA
SetFileTime
GetFileTime
CloseHandle
GetFileSize
MapViewOfFile
UnmapViewOfFile
WinExec
GetProcAddress
CreateFileMappingA
lstrlenA
GetCurrentProcessId
LoadLibraryA
CopyFileA
GetWindowsDirectoryA
WritePrivateProfileStringA
GetSystemDirectoryA
GetCurrentDirectoryA
GetTempPathA
GetModuleHandleA
GetStartupInfoA
GetVersionExA
GetModuleFileNameA
DeleteFileA
user32
LoadIconA
advapi32
RegFlushKey
RegEnumKeyA
GetUserNameA
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyA
shell32
ShellExecuteA
wsock32
gethostbyaddr
ioctlsocket
gethostname
Sections
.text Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE