Static task
static1
Behavioral task
behavioral1
Sample
a2773efdbd1958d5b64686f6793fd936.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2773efdbd1958d5b64686f6793fd936.exe
Resource
win10v2004-20240221-en
General
-
Target
a2773efdbd1958d5b64686f6793fd936
-
Size
53KB
-
MD5
a2773efdbd1958d5b64686f6793fd936
-
SHA1
dd65348902fa42f8d908bdfacde774710c098aa3
-
SHA256
9f7b19c4ce9abde230134422254dd2154cc1b343faab5d2a6938d33ff509cc88
-
SHA512
d57faa670876f383ae689aa77503f96dc330ffc4ac2bdb240e37c0f64f857add3e137883d4cd19ef8e68e706ead42f6bdaef365104feb9d54a7f42c5023ca3bd
-
SSDEEP
1536:6lL+IKoTEHHS2wo91DxIkExQ1hNvEBS7yNtgE:oeoTGSQ1DmxQBvz7yX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2773efdbd1958d5b64686f6793fd936
Files
-
a2773efdbd1958d5b64686f6793fd936.exe windows:4 windows x86 arch:x86
0ac624e50d83bfac28d791c796d11481
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
ExitProcess
GetOEMCP
LocalFree
MoveFileA
SetConsoleTextAttribute
lstrcpyW
advapi32
BuildSecurityDescriptorA
CryptDeriveKey
NotifyChangeEventLog
QueryServiceObjectSecurity
QueryServiceStatus
RegCreateKeyA
RegDeleteKeyA
RegReplaceKeyW
SetPrivateObjectSecurity
SetSecurityInfoExW
SetServiceObjectSecurity
StartServiceCtrlDispatcherA
user32
CharLowerBuffW
DestroyCursor
DestroyWindow
DialogBoxParamW
GetUserObjectSecurity
MapWindowPoints
RemoveMenu
SetLogonNotifyWindow
SetUserObjectInformationW
UnhookWinEvent
WinHelpW
gdi32
CheckColorsInGamut
CombineTransform
EnumICMProfilesW
ExtCreatePen
FillRgn
GetArcDirection
GetDIBits
GetTextExtentExPointA
GetTextExtentPointW
GetWindowExtEx
RectInRegion
ResetDCW
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE