StartAction
Static task
static1
Behavioral task
behavioral1
Sample
2e0871af9cc539acb513e8afc795c2dab01febd688f2754c6a551485184070dc.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e0871af9cc539acb513e8afc795c2dab01febd688f2754c6a551485184070dc.dll
Resource
win10v2004-20240426-en
General
-
Target
2e0871af9cc539acb513e8afc795c2dab01febd688f2754c6a551485184070dc.exe
-
Size
64KB
-
MD5
a297976b28412278a000392bc670cc16
-
SHA1
7b9bcde6a509566214169056190330a7b7ea4598
-
SHA256
2e0871af9cc539acb513e8afc795c2dab01febd688f2754c6a551485184070dc
-
SHA512
3c07ef9dd9d6e6117d63e2d46e38675fe0c6b57accd6481a0945541617bda1ac9f075fac68a5ac0659ac1eb15f62476b51bd605a7fa0ca195cede18ebf721429
-
SSDEEP
384:qftfsIczWxxdJHmgDVvkpzF4YuygFc51u8:qtf6zWxxdpZFrY9B4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2e0871af9cc539acb513e8afc795c2dab01febd688f2754c6a551485184070dc.exe
Files
-
2e0871af9cc539acb513e8afc795c2dab01febd688f2754c6a551485184070dc.exe.dll windows:5 windows x64 arch:x64
648f2e0978686ef5cec5d47a5fb7fd2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
msi
ord120
ord74
ord26
ord160
ord159
ord114
ord49
ord32
ord8
kernel32
RtlUnwindEx
CloseHandle
WaitForSingleObject
SetLastError
TerminateThread
CreateThread
VirtualProtect
VirtualAlloc
VirtualFree
user32
wsprintfW
advapi32
RegQueryValueExW
Exports
Exports
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ