Static task
static1
Behavioral task
behavioral1
Sample
a2450f6829b8f0835eb3a5d9427cf77d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2450f6829b8f0835eb3a5d9427cf77d.exe
Resource
win10v2004-20240221-en
General
-
Target
a2450f6829b8f0835eb3a5d9427cf77d
-
Size
40KB
-
MD5
a2450f6829b8f0835eb3a5d9427cf77d
-
SHA1
e33ff47a0c004fcea3546e5d40fb811f99240367
-
SHA256
321cb6e438f3f16553cb7a452e14ea8559a74c15557a31a6f8773769f3dbee80
-
SHA512
13303824e639919ad475af131fad43b5038219f08b30001cb811978f707a4893e213e5f1d725675444fdf515ba782ec185f40f1d0295787b11207b195637cfd8
-
SSDEEP
768:+SBIXxqBPB5ya71KVJqkWHTU1ueENR/pFIVIoYJ4Y/iCz6WplZ6jqjVt:HIBqz5yo4sk8TuvARhFIlYT/LZVJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2450f6829b8f0835eb3a5d9427cf77d
Files
-
a2450f6829b8f0835eb3a5d9427cf77d.exe windows:4 windows x86 arch:x86
39cbfb60296e83fbd68649fc66229463
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCommModemStatus
GetModuleHandleA
GetNumberFormatW
GetProcessWorkingSetSize
GetSystemDefaultLCID
OpenProfileUserMapping
OpenSemaphoreA
ReadConsoleOutputAttribute
SetThreadAffinityMask
Thread32First
advapi32
AdjustTokenGroups
ConvertSecurityDescriptorToAccessA
CryptGetKeyParam
GetMultipleTrusteeW
GetSidIdentifierAuthority
MakeAbsoluteSD
ObjectPrivilegeAuditAlarmA
OpenServiceW
RegConnectRegistryW
SetAclInformation
user32
ArrangeIconicWindows
CallMsgFilter
DialogBoxIndirectParamW
GetClassInfoExA
GetMenuItemInfoA
GetMessageA
GetWindowContextHelpId
GetWindowTextLengthA
IMPGetIMEA
MessageBoxA
MonitorFromWindow
OpenClipboard
RegisterClassExW
SendNotifyMessageA
SetMenuInfo
TrackMouseEvent
wsprintfA
Sections
.text Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE