Static task
static1
Behavioral task
behavioral1
Sample
2ced67ce5f5c27d84a37b9ea5f852855.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ced67ce5f5c27d84a37b9ea5f852855.exe
Resource
win10v2004-20231215-en
General
-
Target
2ced67ce5f5c27d84a37b9ea5f852855
-
Size
804KB
-
MD5
2ced67ce5f5c27d84a37b9ea5f852855
-
SHA1
b054c2598979cf42a4a9689a35ff982fdca783c7
-
SHA256
10c279f679ac1fa0ce90dfefdc991a4bc2ecfc41c2c5ee222d8aa65e644a265f
-
SHA512
cde8a3388ffba18930a5594bfb679af8f4a9ebadd056fa6f790754385882332db3d8b9cc1ef64aa391a2d54f88d289caaba422bfbe817eabac4f754d3e2c5e17
-
SSDEEP
12288:2fHRApen3N0bVD0TxAf1leJUsJYMgqESp2wdgx6:WxApen3N0D8ANupJYMgq7dt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ced67ce5f5c27d84a37b9ea5f852855
Files
-
2ced67ce5f5c27d84a37b9ea5f852855.exe windows:5 windows x86 arch:x86
e763709477ad8b1a4744a14de987e859
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
InterlockedDecrement
VirtualProtect
GetCurrentThreadId
LoadLibraryA
VirtualProtect
LoadLibraryW
InterlockedCompareExchange
VirtualProtect
GetProcessHeap
lstrlenA
DeleteCriticalSection
InterlockedDecrement
LoadLibraryA
CreateFileW
InterlockedIncrement
CreateEventW
LocalFree
InitializeCriticalSection
CreateEventW
HeapDestroy
EnterCriticalSection
CloseHandle
ReadFile
LeaveCriticalSection
LoadLibraryW
ReadFile
InitializeCriticalSection
VirtualProtect
LocalFree
GetTickCount
GetProcessHeap
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
GetCurrentProcess
InitializeCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetTickCount
GetLastError
lstrcmpiW
ReadFile
lstrcmpiW
HeapFree
SetLastError
CreateThread
InterlockedExchange
GetModuleFileNameW
FreeLibrary
InitializeCriticalSection
InterlockedDecrement
LocalFree
LoadLibraryA
lstrcmpiW
VirtualAlloc
VirtualProtect
EnterCriticalSection
GetTickCount
LocalAlloc
Sleep
InterlockedIncrement
DeleteCriticalSection
GetProcessHeap
GetVersionExA
LocalFree
EnterCriticalSection
FreeLibrary
InterlockedIncrement
GetModuleFileNameW
GetCurrentProcess
DeleteCriticalSection
GetModuleHandleW
GetSystemTimeAsFileTime
GetModuleFileNameW
InterlockedExchange
GetModuleHandleA
GetCurrentThreadId
lstrcmpiW
EnterCriticalSection
DisableThreadLibraryCalls
LoadLibraryW
lstrlenA
VirtualAlloc
user32
ShowWindow
GetDesktopWindow
GetDC
GetParent
KillTimer
PostMessageW
SetWindowPos
MessageBoxW
GetSysColor
GetSysColor
GetSysColor
BeginPaint
GetParent
wsprintfA
GetSysColor
DispatchMessageW
SetWindowTextW
SetWindowPos
SetWindowTextW
EndDialog
PostQuitMessage
SetWindowPos
CreateWindowExW
SetWindowLongW
GetWindowLongW
LoadCursorW
PostQuitMessage
BeginPaint
BeginPaint
IsDlgButtonChecked
GetWindowRect
wsprintfA
GetWindowRect
GetWindowLongW
SetTimer
GetSysColor
GetParent
DispatchMessageW
DefWindowProcW
SetDlgItemTextW
PostMessageW
EndDialog
DefWindowProcW
SetForegroundWindow
SetDlgItemTextW
GetSysColor
SetWindowLongW
GetSystemMetrics
BeginPaint
PeekMessageW
KillTimer
BeginPaint
SetDlgItemTextW
GetSystemMetrics
SetDlgItemTextW
GetWindowLongW
KillTimer
PostMessageW
ShowWindow
DispatchMessageW
SetForegroundWindow
SendMessageW
SetWindowPos
CreateWindowExW
DispatchMessageW
KillTimer
EndPaint
LoadStringW
InvalidateRect
GetDC
SetCursor
GetWindowLongW
SetFocus
MessageBoxW
EnableWindow
DestroyWindow
SetFocus
GetWindowLongW
LoadCursorW
KillTimer
Sections
.text Size: 717KB - Virtual size: 968KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ