Static task
static1
Behavioral task
behavioral1
Sample
2f1c57bf099562c82d996857e287ec5a22fe4e8a5419e404efb6058656d5dd14.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f1c57bf099562c82d996857e287ec5a22fe4e8a5419e404efb6058656d5dd14.exe
Resource
win10v2004-20240611-en
General
-
Target
2f1c57bf099562c82d996857e287ec5a22fe4e8a5419e404efb6058656d5dd14.exe
-
Size
491KB
-
MD5
272ee395c230d7b0a5a7e0f3a032e968
-
SHA1
f63cc320253ef839fb55de1140b838a5a829793a
-
SHA256
2f1c57bf099562c82d996857e287ec5a22fe4e8a5419e404efb6058656d5dd14
-
SHA512
f352eb062003b85ef12386c2fcf613cdb8da5e5ca65605018038e76529d33e19c34fe62a676ad766d72717af31b0f13bad7f1d113715451e1b495307d5bd06d5
-
SSDEEP
6144:+sRK3ojAbWy4z1i6qRH1ggyv0NPIXgwqYrrH58+293vM/2zaVZOukWjOpcVW2:+WjjAbK0NOi+293vM/PZOugpcVW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f1c57bf099562c82d996857e287ec5a22fe4e8a5419e404efb6058656d5dd14.exe
Files
-
2f1c57bf099562c82d996857e287ec5a22fe4e8a5419e404efb6058656d5dd14.exe.exe windows:5 windows x86 arch:x86
ef86d78a71637bc67f9331488898e4a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBkColor
GetFontUnicodeRanges
GetTextCharsetInfo
GetCurrentObject
UpdateColors
GetDCBrushColor
GetDeviceCaps
GetStretchBltMode
GetTextCharacterExtra
user32
WindowFromDC
SetWindowTextA
GetMenuItemCount
RemovePropA
SetFocus
PostMessageA
GetDlgItem
GetWindowContextHelpId
EndDialog
LoadIconA
ShowWindow
GetDlgItemInt
GetWindowLongA
GetForegroundWindow
GetWindowDC
DrawTextA
GetScrollPos
IsWindowEnabled
GetMenuItemID
GetMenu
GetMenuCheckMarkDimensions
IsWindowUnicode
GetInputState
CheckDlgButton
GetDialogBaseUnits
GetMenuState
SetDlgItemTextA
EndPaint
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
IsProcessorFeaturePresent
GetLastError
GlobalHandle
WriteFile
GlobalFlags
GetFileTime
GetDriveTypeA
SizeofResource
FindClose
IsDebuggerPresent
GetProcAddress
GetCurrentProcess
GetCurrentProcessId
DeleteFileA
GetModuleHandleA
GetVersion
CloseHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStdHandle
GetModuleFileNameW
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
GetConsoleCP
GetConsoleMode
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
SetEnvironmentVariableA
Sections
.text Size: 421KB - Virtual size: 421KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE