Static task
static1
Behavioral task
behavioral1
Sample
2d716cf7ec2b2874e8db17b593d511fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d716cf7ec2b2874e8db17b593d511fa.exe
Resource
win10v2004-20231215-en
General
-
Target
2d716cf7ec2b2874e8db17b593d511fa
-
Size
148KB
-
MD5
2d716cf7ec2b2874e8db17b593d511fa
-
SHA1
8e4bd3b3f4e993fcdebe0fd1d7ed0b9f689fb910
-
SHA256
7dd95023f68555e3e3fd5aeb69ce07966e2d9325e50387c395bda77aff7dceda
-
SHA512
3a734155166bce7dcf0046d1417b65e88050edef10221424f8c939ea7230896b1d8d47ef0ed28c0f1b7c6fb99ff773017ac7a3c200f01c82e1f3f78a264c6c74
-
SSDEEP
3072:FKB77AZx/m9XbNPJDexHMYPrZSZwsT1JU6Yl6am9y1:Fk8x/m5dJ8HRPV76S626jc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d716cf7ec2b2874e8db17b593d511fa
Files
-
2d716cf7ec2b2874e8db17b593d511fa.exe windows:4 windows x86 arch:x86
1955b08cfb855a0c86a4069c6cc259ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerFindFileA
VerInstallFileA
kernel32
GetModuleHandleW
GetProcAddress
GetOEMCP
ExitProcess
IsBadReadPtr
GetModuleHandleA
GetVersionExA
LoadLibraryA
GetCommandLineA
VirtualAlloc
ExitThread
LoadLibraryExA
user32
GetCapture
DeleteMenu
GetWindowDC
IsWindowEnabled
GetForegroundWindow
GetMenuItemInfoA
CallWindowProcA
IsRectEmpty
DrawIconEx
EnableWindow
GetWindowThreadProcessId
GetClassLongA
CharNextA
DrawFrameControl
CharLowerA
GetScrollPos
CharUpperBuffA
FrameRect
OpenClipboard
ShowWindow
EndPaint
DrawTextA
ActivateKeyboardLayout
ShowScrollBar
GetWindowLongW
CharNextW
SetPropA
SetWindowPos
ScreenToClient
GetTopWindow
GetSubMenu
OffsetRect
TranslateMessage
CreateMenu
SetScrollInfo
GetDCEx
GetDesktopWindow
GetMenu
BeginPaint
AdjustWindowRectEx
GetFocus
GetKeyboardType
OemToCharA
PostQuitMessage
DispatchMessageW
GetSysColor
MessageBoxA
WindowFromPoint
EnumThreadWindows
SetScrollPos
SetClassLongA
MapVirtualKeyA
TrackPopupMenu
CharLowerBuffA
GetIconInfo
GetSystemMenu
InsertMenuItemA
RemoveMenu
DefFrameProcA
PeekMessageW
LoadIconA
DefWindowProcA
SetForegroundWindow
SendMessageW
GetPropA
InsertMenuA
GetKeyNameTextA
GetParent
GetMenuItemID
MsgWaitForMultipleObjects
DrawMenuBar
InflateRect
IsDialogMessageA
EnumWindows
CreateWindowExA
DrawIcon
RemovePropA
CreateIcon
IsZoomed
CheckMenuItem
UnhookWindowsHookEx
LoadKeyboardLayoutA
CharToOemA
SetTimer
IsWindow
GetClassNameA
GetWindowLongA
PeekMessageA
GetKeyState
ReleaseCapture
EnumChildWindows
IsDialogMessageW
GetKeyboardLayoutNameA
SetClipboardData
SetRect
FillRect
GetScrollRange
DestroyIcon
EnableScrollBar
GetWindowTextA
DefMDIChildProcA
LoadBitmapA
FindWindowA
GetScrollInfo
CreatePopupMenu
LoadCursorA
GetMenuState
RegisterClipboardFormatA
DestroyWindow
PostMessageA
CallNextHookEx
GetSysColorBrush
SetCursor
MapWindowPoints
RedrawWindow
UnregisterClassA
DestroyMenu
SendMessageA
DestroyCursor
MoveWindow
GetWindowRect
SetFocus
LoadStringA
GetDC
Sections
CODE Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 734B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ