Static task
static1
Behavioral task
behavioral1
Sample
c2e77e9ced073e4af01982776d231915.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2e77e9ced073e4af01982776d231915.exe
Resource
win10v2004-20240226-en
General
-
Target
c2e77e9ced073e4af01982776d231915
-
Size
385KB
-
MD5
c2e77e9ced073e4af01982776d231915
-
SHA1
e59a998112c765431c888d8459ce94b420f99379
-
SHA256
0b90cd9b56cae504bc55e1345fee740eb5bf3cd32b1e35d546da41d5d15aed41
-
SHA512
bf2de0006e8ce08a18577fa8ce510f8a5fdd70b77e5c874b47c655292f194226844690885c8f4dd518ff0e0914594692396591482a18024b3062a43367047ea6
-
SSDEEP
12288:QHeNk1r749HFbFWEYK0Hi3D9AwuN+pfu:Q+u78HJFpJIiT9AVN+h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2e77e9ced073e4af01982776d231915
Files
-
c2e77e9ced073e4af01982776d231915.exe windows:4 windows x86 arch:x86
ec186f57fa684f4e7bfcf0fffd224274
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
lstrcpyA
lstrlenA
Sleep
SetEvent
VirtualFree
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
GetLastError
VirtualProtect
GetModuleHandleA
DeleteFileA
GetCurrentThreadId
ResumeThread
ReadFile
SuspendThread
CreateFileA
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
FreeLibrary
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RaiseException
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
LCMapStringW
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleFileNameA
VirtualQuery
CreateEventA
LoadLibraryW
GetProcAddress
CloseHandle
LCMapStringA
ExitProcess
user32
UpdateWindow
LoadIconA
LoadCursorA
ShowWindow
EndPaint
DrawTextA
GetClientRect
CreateWindowExA
PostQuitMessage
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
LoadStringA
EndDialog
AttachThreadInput
BringWindowToTop
RegisterClassExA
LoadAcceleratorsA
GetMessageA
GetDesktopWindow
IsWindow
IsWindowVisible
IsRectEmpty
SetRect
UnregisterClassA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
GetDC
FillRect
ReleaseDC
RegisterClassA
TranslateAcceleratorA
gdi32
GetDIBits
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
Rectangle
SetROP2
GetObjectA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
pdh
PdhCollectQueryData
PdhGetCounterInfoA
PdhConnectMachineA
PdhGetDataSourceTimeRangeW
wininet
InternetOpenW
InternetCloseHandle
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 335KB - Virtual size: 715KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE