Static task
static1
Behavioral task
behavioral1
Sample
2d69b372b14e098367c625a499108db8c179ecbf4864e815ffeb77e3d09d3d48.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d69b372b14e098367c625a499108db8c179ecbf4864e815ffeb77e3d09d3d48.exe
Resource
win10v2004-20240226-en
General
-
Target
2d69b372b14e098367c625a499108db8c179ecbf4864e815ffeb77e3d09d3d48
-
Size
462KB
-
MD5
29cc2d2c28c798ff6b0826888c861efc
-
SHA1
467afc9ec042a638e29b542120769ba7b7dc0446
-
SHA256
2d69b372b14e098367c625a499108db8c179ecbf4864e815ffeb77e3d09d3d48
-
SHA512
a3e03cf378018b278a387af31f38674fa27f46122b65cd14a635844f59758015c40f309c73a95900329564bf2850ae42ff820b69eba6ba02fb70380f50d8ff32
-
SSDEEP
12288:aqucQ/BN1xhsk+7THBxgEwDHcZUJ4MPcZc:urgnHUFD8ZKncZc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d69b372b14e098367c625a499108db8c179ecbf4864e815ffeb77e3d09d3d48
Files
-
2d69b372b14e098367c625a499108db8c179ecbf4864e815ffeb77e3d09d3d48.exe windows:5 windows x86 arch:x86
31166804690745604d28c1924eb2bb58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ReadProcessMemory
GetFileAttributesA
VerifyVersionInfoA
FileTimeToSystemTime
GlobalUnlock
CreateDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetLastError
CopyFileA
SetFileAttributesA
FindClose
GetLocalTime
LocalAlloc
FindNextChangeNotification
WaitForMultipleObjects
FindNextFileA
FindFirstChangeNotificationA
ContinueDebugEvent
GetCurrentDirectoryA
WaitForDebugEvent
GetCurrentThreadId
GetVersionExA
GetCurrentProcessId
LocalFree
GetSystemTime
DeleteFileA
UpdateResourceA
BeginUpdateResourceA
EndUpdateResourceA
CreateFileA
WaitForSingleObject
GlobalAlloc
WriteFile
GetDriveTypeA
GetVolumeInformationA
GetExitCodeProcess
CreateProcessA
TerminateProcess
ReadFile
GetEnvironmentVariableA
GetShortPathNameA
GetLogicalDriveStringsA
OpenMutexA
GetModuleFileNameA
CreateMutexA
GetFileTime
CloseHandle
GetTempPathA
GetProcessHeap
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
HeapSize
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
FlushFileBuffers
GetCurrencyFormatA
FormatMessageA
GetCurrentThread
GetTickCount
GlobalLock
QueryPerformanceCounter
SetFirmwareEnvironmentVariableA
GetCurrentProcess
lstrlenA
SetFileTime
GlobalMemoryStatus
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
CompareStringA
GetCPInfo
CompareStringW
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
user32
GetClipboardOwner
GetDesktopWindow
EmptyClipboard
GetClipboardData
MessageBoxA
GetForegroundWindow
GetCapture
GetFocus
CloseClipboard
wsprintfW
GetCaretPos
GetActiveWindow
OpenClipboard
GetSystemMetrics
SetClipboardData
GetCursorPos
advapi32
RegOpenKeyExA
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
dnsapi
DnsQuery_A
DnsFree
ws2_32
closesocket
socket
htons
sendto
gethostbyname
WSAStartup
version
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
wininet
HttpQueryInfoA
InternetConnectA
FtpOpenFileA
InternetCrackUrlA
InternetReadFile
InternetCreateUrlA
HttpAddRequestHeadersA
FtpGetFileSize
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpOpenRequestA
Sections
.text Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ