Static task
static1
Behavioral task
behavioral1
Sample
2d7c95fb3ba2fd227dbe28a3ad70fda0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d7c95fb3ba2fd227dbe28a3ad70fda0N.exe
Resource
win10v2004-20240704-en
General
-
Target
2d7c95fb3ba2fd227dbe28a3ad70fda0N.exe
-
Size
203KB
-
MD5
2d7c95fb3ba2fd227dbe28a3ad70fda0
-
SHA1
e768c03dfd4dde23805c89713f9111427aa77958
-
SHA256
32c9c811490e1e3f7b2ea1e0e4c418b0da3aa3da9c285d6bc7c610f6619c5d77
-
SHA512
dc4520c602326f1074ce3619c61c8fb2ef33bd560a9b06f85ed35521c56965c763c17544494332e026256c8393419b0346e67e41903bbc2e6fb6e26c2eed297e
-
SSDEEP
3072:Z1g2ZB+GEhO118/bPyKxM4QTJt2cWGsNPKisJoyjK7yGAe9Q0enyU8GZqaP+wPml:3hYzxMlNNsAisDRGAL0eyUBnPrPO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d7c95fb3ba2fd227dbe28a3ad70fda0N.exe
Files
-
2d7c95fb3ba2fd227dbe28a3ad70fda0N.exe.exe windows:4 windows x86 arch:x86
3b42f9693bdd770281b738cfac146ecf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
lstrcpynW
GetModuleFileNameA
GetFileType
GetEnvironmentStringsA
GetProcAddress
BeginUpdateResourceW
GetCurrentThreadId
CreateMailslotW
AddAtomA
lstrlen
GetEnvironmentStringsW
GetExpandedNameA
WinExec
GetCurrentProcessId
GetThreadPriority
FindAtomA
OpenWaitableTimerW
GetModuleHandleA
GetLocaleInfoA
GetDateFormatA
GetShortPathNameW
user32
GetParent
CreateWindowExA
SetDlgItemTextW
DestroyIcon
GetDlgItemInt
IsWindow
IsMenu
PostMessageA
SetWindowLongW
GetWindowTextW
CallWindowProcW
GetCapture
GetSubMenu
InvalidateRect
DestroyWindow
GetDlgItem
WinHelpA
GetSystemMetrics
SetCursorPos
CreateCaret
CascadeWindows
EnumDesktopsA
GetDCEx
EndDialog
CreatePopupMenu
GetMessageA
GetCursorPos
CreateAcceleratorTableW
GetTopWindow
SetWindowRgn
SendMessageA
gdi32
ColorMatchToTarget
CreateCompatibleDC
Pie
CopyMetaFileW
ExtTextOutW
GetTextColor
SetColorAdjustment
CreatePatternBrush
SetMetaRgn
ExtFloodFill
GetEnhMetaFileDescriptionA
SetTextColor
ExtSelectClipRgn
AddFontResourceW
EndDoc
GetTextFaceW
GetCharacterPlacementA
GetMetaFileA
advapi32
RegOpenKeyW
RegFlushKey
RegOpenKeyA
shlwapi
GetMenuPosFromID
PathUnmakeSystemFolderA
UrlIsNoHistoryW
PathIsURLA
SHCreateShellPalette
PathRemoveArgsW
SHCopyKeyW
SHRegOpenUSKeyA
PathSearchAndQualifyW
Sections
.eX Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ah Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wc Size: 512B - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cKgaFt Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JbcCcw Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ