Static task
static1
Behavioral task
behavioral1
Sample
2f65b2837628e8f88b7ad14d028e33ca8280500fecefe30641fa487662692b20.exe
Resource
win7-20240508-en
General
-
Target
2f65b2837628e8f88b7ad14d028e33ca8280500fecefe30641fa487662692b20
-
Size
2.9MB
-
MD5
011e475dce5647a27edb07f4069d8761
-
SHA1
578863b1390f6c8405f8507e1122b532e3cffe43
-
SHA256
2f65b2837628e8f88b7ad14d028e33ca8280500fecefe30641fa487662692b20
-
SHA512
f9a6f6aac07155b336951e51d0a2fd828aa4cd90c5a03d8820e3bb9fb1c3b021893d33ad7caf34cd03fa37002839315975448f33219aad19ef6a15f7ab299e1c
-
SSDEEP
49152:/qmY1VcSwEb06ZNL6sAb5WYC/LFFdHPhZ+b5yBLkSJZVxeC:/fY1WSw606+vYnNJZ+kd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f65b2837628e8f88b7ad14d028e33ca8280500fecefe30641fa487662692b20
Files
-
2f65b2837628e8f88b7ad14d028e33ca8280500fecefe30641fa487662692b20.exe windows:5 windows x86 arch:x86
ba2d68ceac9298dc65b95d9551616e50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
InterlockedDecrement
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetLastError
RaiseException
LoadResource
FindResourceW
DecodePointer
GetModuleHandleW
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
CreateThread
SetEvent
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
GetProcessHeap
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
GetVersionExW
LocalAlloc
LocalFree
GetCurrentProcess
OutputDebugStringW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLongPathNameW
GetExitCodeProcess
WriteFile
GetTickCount
GetTempPathW
GetFileAttributesW
CopyFileW
HeapReAlloc
HeapSize
GetFileSize
ReadFile
WideCharToMultiByte
GetPrivateProfileIntW
lstrlenW
GlobalFree
ReadProcessMemory
lstrcpyW
CreateProcessW
FindClose
GetEnvironmentVariableW
CreateDirectoryW
RemoveDirectoryW
FindFirstFileW
FindNextFileW
GetCurrentProcessId
GetSystemInfo
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GetVolumeInformationW
OutputDebugStringA
SetPriorityClass
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetCurrentThread
GetStringTypeW
GetFileType
WriteConsoleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
FlushFileBuffers
SetEndOfFile
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
GetFullPathNameW
GetCurrentDirectoryW
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
GetProcAddress
LoadLibraryW
CloseHandle
Process32FirstW
DeleteFileW
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
MoveFileExW
DeleteCriticalSection
Process32NextW
Sleep
CreateToolhelp32Snapshot
OpenProcess
GetSystemDirectoryW
CreateFileW
GlobalAlloc
DeviceIoControl
TryEnterCriticalSection
DuplicateHandle
user32
wsprintfW
LoadStringW
FindWindowW
PostMessageW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
CharNextW
advapi32
CryptAcquireContextW
RegisterEventSourceW
DeregisterEventSource
CryptGenRandom
CryptReleaseContext
RegQueryValueExW
RegOpenKeyW
ImpersonateLoggedOnUser
RevertToSelf
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
LookupAccountSidW
GetTokenInformation
CreateProcessAsUserW
ReportEventW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
RegEnumKeyW
RegDeleteKeyW
OpenProcessToken
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFolderPathW
SHChangeNotify
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
SHGetValueW
SHSetValueW
SHDeleteKeyW
SHDeleteValueW
PathFileExistsW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wininet
HttpQueryInfoW
InternetOpenW
InternetSetOptionW
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
InternetQueryOptionW
wldap32
ord46
ord60
ord50
ord41
ord22
ord26
ord27
ord143
ord211
ord32
ord33
ord35
ord79
ord200
ord301
ord30
ws2_32
recv
send
WSAStartup
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSAIoctl
getaddrinfo
freeaddrinfo
recvfrom
sendto
accept
listen
ioctlsocket
gethostname
WSACleanup
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 553KB - Virtual size: 553KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE