Static task
static1
Behavioral task
behavioral1
Sample
2b314094354168c59c5b8436a962ff43.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2b314094354168c59c5b8436a962ff43.exe
Resource
win10v2004-20231215-en
General
-
Target
2b314094354168c59c5b8436a962ff43
-
Size
375KB
-
MD5
2b314094354168c59c5b8436a962ff43
-
SHA1
90f9d4d4180996d54578747b91169b32880678d1
-
SHA256
423f2d0b52c89d744f52d521333b8b17753d0a6bda84a563e404aa4f23b1b406
-
SHA512
ef05080d793d39b9daa89418b134a9d642ca6f909cd896c384d1ecdf6607636a4aefed7359bcd365aaa9ca3e9c7b39ddf7138b9a1211a977ae3fa386dec4eab6
-
SSDEEP
6144:Nck+UDJeMCZJPWZI2pxLRjA4ZD05WGNl6yZCkJNtuJd:N0oUJPWZ5pxC41G2eCklu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b314094354168c59c5b8436a962ff43
Files
-
2b314094354168c59c5b8436a962ff43.exe windows:4 windows x86 arch:x86
c23fc1e59aa95933855d8b31b9d858fd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
HeapFree
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetTimeZoneInformation
GetCommandLineA
GetFileType
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
ExitProcess
TerminateProcess
SetFileTime
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrcmpA
GetCurrentThread
GetCurrentThreadId
GlobalFree
LockResource
FindResourceA
LoadResource
SetCurrentDirectoryA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetFileInformationByHandle
GetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
SearchPathA
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemDirectoryA
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
GetProcessVersion
GetVersion
GetCurrentDirectoryA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
SizeofResource
GetShortPathNameA
GetDiskFreeSpaceA
GlobalFlags
lstrcmpiA
GetFileTime
GetFullPathNameA
GetTempFileNameA
IsBadWritePtr
GetFileAttributesA
lstrcpyA
GetProfileStringA
GlobalGetAtomNameA
MulDiv
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
lstrcpynA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcatA
GlobalAddAtomA
InterlockedDecrement
lstrlenA
GlobalDeleteAtom
IsBadCodePtr
GetEnvironmentStringsW
SetHandleCount
user32
EqualRect
SystemParametersInfoA
LoadIconA
LoadAcceleratorsA
DestroyMenu
CharUpperA
IsIconic
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
SetRectEmpty
TranslateAcceleratorA
ReleaseCapture
GetDesktopWindow
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
DefFrameProcA
TranslateMDISysAccel
DrawMenuBar
DefMDIChildProcA
RedrawWindow
InflateRect
SetCapture
OffsetRect
ClientToScreen
PtInRect
SetCursorPos
DestroyCursor
LoadCursorA
WaitMessage
GetWindowThreadProcessId
WindowFromPoint
IsZoomed
IntersectRect
SetParent
IsRectEmpty
AppendMenuA
DeleteMenu
GetSystemMenu
SetTimer
KillTimer
SetRect
GetClassNameA
InsertMenuA
GetMenuStringA
GetSysColorBrush
LoadStringA
DestroyIcon
InvertRect
FillRect
GetDCEx
LockWindowUpdate
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetMenuItemID
GetMenu
TrackPopupMenu
AdjustWindowRectEx
MapWindowPoints
CreateWindowExA
SetPropA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
GetMessageTime
GetWindow
GetWindowRect
RegisterWindowMessageA
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetWindowTextA
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItemTextA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
MessageBoxA
SetCursor
ShowOwnedPopups
PostMessageA
PostQuitMessage
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
ScreenToClient
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessagePos
LoadMenuA
GetSubMenu
CopyRect
GetSysColor
DrawFocusRect
GetClientRect
InvalidateRect
GetDC
ReleaseDC
SendMessageA
EnableWindow
UpdateWindow
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
DefWindowProcA
GetWindowTextLengthA
GetDlgCtrlID
CallWindowProcA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
CreateDIBitmap
SelectObject
CreateBitmap
PatBlt
CreateRectRgnIndirect
SetTextColor
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
GetClipBox
MoveToEx
IntersectClipRect
SetTextAlign
LineTo
GetTextAlign
DeleteObject
CreateRectRgn
GetDeviceCaps
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
StretchDIBits
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectA
CombineRgn
SetRectRgn
BitBlt
GetTextExtentPointA
GetStockObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueA
RegQueryValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
shell32
ExtractIconA
SHGetFileInfoA
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteExA
ShellExecuteA
comctl32
ImageList_Destroy
ImageList_LoadImageA
ImageList_Draw
ord17
Sections
.text Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE