Static task
static1
Behavioral task
behavioral1
Sample
a2ce6b433a57f09f64ff033a884b50fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2ce6b433a57f09f64ff033a884b50fb.exe
Resource
win10v2004-20240221-en
General
-
Target
a2ce6b433a57f09f64ff033a884b50fb
-
Size
250KB
-
MD5
a2ce6b433a57f09f64ff033a884b50fb
-
SHA1
0077064e7fecc0f6c10e97ed6d597ad2d9ad499d
-
SHA256
2f2555ae1b3df9513932be220ab47d2c82f8f7ecd2880cf169dcb70d042a30b0
-
SHA512
71e56666cdf22329aca11a48c28af3d6e861af6e9dc3926083bf66455189d5f124d88cd66f0eeea0255feed13b9e38eb3fc3ac61d5cf06d983596fb12389343b
-
SSDEEP
3072:U7zeA6UVG+JelQhgd7NwWt/z6/+rdLhhh+7dby8Y0jDbhoLASUEvPYZV7XcJ3Y3y:U3rTetJc+hh+J5VbhokJHZdqY33C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2ce6b433a57f09f64ff033a884b50fb
Files
-
a2ce6b433a57f09f64ff033a884b50fb.exe windows:4 windows x86 arch:x86
5040f916c4b114ec49205777f1fe0b77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDriveStringsA
GetShortPathNameA
CreateProcessA
DeleteFileA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetDiskFreeSpaceA
GetSystemDirectoryA
GetModuleHandleA
GetModuleFileNameA
OpenEventA
SetEvent
GetFileType
GetLastError
GetFileSize
GetSystemInfo
SetFilePointer
SetEndOfFile
CreateFileA
ReadFile
WriteFile
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
GetVersionExA
GetCPInfo
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
LocalFree
FormatMessageA
ReleaseMutex
RaiseException
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
ExitProcess
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
HeapSize
InitializeCriticalSection
GetACP
GetOEMCP
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
GetProcAddress
VirtualAlloc
IsBadWritePtr
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
LoadLibraryA
SetStdHandle
GetTimeZoneInformation
SetEnvironmentVariableA
CloseHandle
OpenMutexA
CreateMutexA
RtlUnwind
WaitForSingleObject
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
PeekNamedPipe
advapi32
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
setupapi
SetupDestroyDiskSpaceList
SetupQuerySpaceRequiredOnDriveA
SetupQueryDrivesInDiskSpaceListA
SetupAddInstallSectionToDiskSpaceListA
SetupCreateDiskSpaceListA
SetupGetLineTextA
SetupInstallFromInfSectionA
SetupSetDirectoryIdA
SetupCloseInfFile
SetupOpenInfFileA
SetupGetTargetPathA
Sections
.text Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
STLPORT_ Size: 4KB - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE