Static task
static1
Behavioral task
behavioral1
Sample
2c19086404214fede3a799e5a43d10d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c19086404214fede3a799e5a43d10d8.exe
Resource
win10v2004-20231215-en
General
-
Target
2c19086404214fede3a799e5a43d10d8
-
Size
282KB
-
MD5
2c19086404214fede3a799e5a43d10d8
-
SHA1
dd16d92cb56585652075584e70862d87a9928725
-
SHA256
c4fb0118c1d27acf149e4e60bec59b14eb5018f2701eddab40e09eecf2010a05
-
SHA512
c0ab3d513d5730b1ed023a1cbfe06ed222e6f8c3a2da430e664a594fbbe2c38fbf0f1356c429192ad7d2ccb8f4f17613df147d1bfb048137c17806a436ebaea7
-
SSDEEP
6144:NiljoBoxb/WlK6la286EjFp79u2WCJiWuBqXOoAO4L8EmMHC:Nilj2oxClzaD69WuBq1Y6MHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c19086404214fede3a799e5a43d10d8
Files
-
2c19086404214fede3a799e5a43d10d8.exe windows:6 windows x86 arch:x86
a4abf634f7ed02bacf63a22abb2369e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegCreateKeyA
user32
MessageBoxA
kernel32
WriteConsoleW
HeapSize
Sleep
ExitProcess
GetCurrentThread
GetThreadContext
SetThreadContext
GetTickCount
VirtualAllocEx
ReadProcessMemory
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetConsoleWindow
FlsAlloc
GetCurrentProcess
GetSystemInfo
VirtualAllocExNuma
LoadLibraryA
K32GetProcessMemoryInfo
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateFileW
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
CloseHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
SetEndOfFile
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ