Static task
static1
Behavioral task
behavioral1
Sample
2d0c31dc4743bfef270319a9a9045bc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d0c31dc4743bfef270319a9a9045bc9.exe
Resource
win10v2004-20231215-en
General
-
Target
2d0c31dc4743bfef270319a9a9045bc9
-
Size
116KB
-
MD5
2d0c31dc4743bfef270319a9a9045bc9
-
SHA1
257f6c80a5f454b36cf1dc7418569e3edab645cc
-
SHA256
7b9079dd597b359f31331b4db336b74bacccfe337d245a054b9c934b488e0355
-
SHA512
0be080b6ca4232489177f662e885ea5dabba16f99dcadd743204620b8c43bf372ce4d6c121903c79ba890327517d54a8ed380f4ab0615e445500267129256872
-
SSDEEP
3072:bgOoEBXN1HlOhcpCgYP4ExbabBBn2lQ6:xddHEtajb6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d0c31dc4743bfef270319a9a9045bc9
Files
-
2d0c31dc4743bfef270319a9a9045bc9.exe windows:4 windows x86 arch:x86
77f46e6609f03333a6f3418a14e69528
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
GetStdHandle
SetHandleCount
SetFilePointer
WriteFile
ReadFile
OpenProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetCPInfo
GetOEMCP
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
GetLastError
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
ReleaseMutex
FormatMessageA
GetTimeZoneInformation
GetACP
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapSize
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
lstrlenA
GetSystemTimeAsFileTime
IsBadReadPtr
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
GetFileType
user32
DispatchMessageA
RegisterClassExA
CreateWindowExA
MessageBoxA
ShowWindow
TranslateMessage
UpdateWindow
DestroyWindow
PostQuitMessage
PostMessageA
SetTimer
GetMessageA
SetWindowTextA
GetClassNameA
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
DefWindowProcA
FindWindowA
EndPaint
BeginPaint
TranslateAcceleratorA
advapi32
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateInstance
CoCreateGuid
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
HttpQueryInfoA
netapi32
Netbios
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ