Static task
static1
Behavioral task
behavioral1
Sample
2d04192ac7e6b51dac2adfdec49bb0ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d04192ac7e6b51dac2adfdec49bb0ae.exe
Resource
win10v2004-20231215-en
General
-
Target
2d04192ac7e6b51dac2adfdec49bb0ae
-
Size
111KB
-
MD5
2d04192ac7e6b51dac2adfdec49bb0ae
-
SHA1
d21cb90e7243e4dff713f465334acbb577c06e76
-
SHA256
a9100d4ce8bea81df4202c2cd49920951f956fe2df12adc2fff9593edaf7dbf6
-
SHA512
ecb6fb3e6390b3b6f1f1d4b477931b7e5e48879be430a41a4f7f46c7d7bea62c8d31869934f292c1bca1c0a902300df7abe9cbf026dc2079a31ade091a0fe7d0
-
SSDEEP
1536:OVejHMLv3OeRp/UvZupD6dqBQ5Xf50c1gST6ypX2BGZqW+kp4g2:OVejHMT31RCaDOLhiWX2BSqW+jg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d04192ac7e6b51dac2adfdec49bb0ae
Files
-
2d04192ac7e6b51dac2adfdec49bb0ae.exe windows:4 windows x86 arch:x86
bdd268077206dfc747de7f67a81bb943
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDIBits
GetClipBox
SaveDC
CopyEnhMetaFileA
user32
SetClassLongA
DrawAnimatedRects
GetClassLongA
GetLastActivePopup
UnregisterClassA
CharNextW
UpdateWindow
MsgWaitForMultipleObjects
GetKeyboardLayout
GetDesktopWindow
GetMessagePos
FindWindowA
GetDC
SetWindowsHookExA
SetRect
GetFocus
ShowWindow
IntersectRect
RemovePropA
IsDialogMessageW
GetWindowDC
DispatchMessageW
MoveWindow
GetKeyboardLayoutNameA
RegisterWindowMessageA
IsWindowVisible
SetWindowTextA
ShowScrollBar
LoadKeyboardLayoutA
DestroyIcon
CloseClipboard
ClientToScreen
OpenClipboard
EnumChildWindows
IsDialogMessageA
SetActiveWindow
GetMenuItemID
ChildWindowFromPoint
GetWindowRect
SetTimer
DefMDIChildProcA
DrawMenuBar
SetParent
IsWindowEnabled
GetWindowThreadProcessId
InvalidateRect
IsZoomed
MapVirtualKeyA
SetWindowPos
GetKeyboardType
GetKeyState
wsprintfA
SetScrollInfo
GetCursor
GetClipboardData
GetMenuStringA
MessageBeep
RegisterClassA
GetCursorPos
GetIconInfo
MapWindowPoints
GetClassInfoA
DestroyMenu
PeekMessageA
SetMenu
CharLowerBuffA
DestroyWindow
SetWindowLongW
ActivateKeyboardLayout
CallNextHookEx
SetScrollPos
GetSystemMetrics
EqualRect
EmptyClipboard
RedrawWindow
DrawTextA
GetClassNameA
GetActiveWindow
UnhookWindowsHookEx
OffsetRect
ReleaseCapture
EnableWindow
RegisterClipboardFormatA
GetForegroundWindow
KillTimer
GetWindow
AdjustWindowRectEx
GetWindowLongA
SetMenuItemInfoA
LoadStringA
ReleaseDC
LoadCursorA
GetMenu
GetWindowLongW
GetKeyboardState
CreatePopupMenu
shell32
DragQueryFileA
Shell_NotifyIconA
SHGetDesktopFolder
oleaut32
VariantChangeType
SysAllocStringLen
SysStringLen
kernel32
lstrlenA
ExitThread
GetLastError
lstrcatA
SetEvent
GetModuleHandleA
VirtualAlloc
SetLastError
GetVersionExA
VirtualAllocEx
Sleep
GlobalFindAtomA
CreateEventA
ExitProcess
LocalAlloc
GetProcAddress
GetSystemDefaultLangID
version
VerInstallFileA
VerFindFileA
VerQueryValueA
shlwapi
SHEnumValueA
PathFileExistsA
SHSetValueA
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
PathIsContentTypeA
comctl32
ImageList_Create
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ