Static task
static1
Behavioral task
behavioral1
Sample
2a65307563b670e080ab1aa1be224310ca27826b4c8cc4faa2b9a937c6b47fa4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a65307563b670e080ab1aa1be224310ca27826b4c8cc4faa2b9a937c6b47fa4.exe
Resource
win10v2004-20240709-en
General
-
Target
2a65307563b670e080ab1aa1be224310ca27826b4c8cc4faa2b9a937c6b47fa4
-
Size
203KB
-
MD5
e30e5936abe71ba50fcdda0dee5fa753
-
SHA1
55b03797054953a4bd54a1f312b0cca01fa69282
-
SHA256
2a65307563b670e080ab1aa1be224310ca27826b4c8cc4faa2b9a937c6b47fa4
-
SHA512
7ed33c9b790cd50b24b50fc7ec963dcb02c56d43fe30c476441f3ab0608812ce1227062080e922adf749cb13417b22baa8da3c5f5929f5e9bed4ab6bffe7e318
-
SSDEEP
6144:oEL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:BnksHxyXcfIRhFE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a65307563b670e080ab1aa1be224310ca27826b4c8cc4faa2b9a937c6b47fa4
Files
-
2a65307563b670e080ab1aa1be224310ca27826b4c8cc4faa2b9a937c6b47fa4.exe windows:4 windows x86 arch:x86
dec3dee9869bb0d71498fbbf0d597bb9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
MoveFileW
GetLogicalDrives
WinExec
SearchPathW
GetACP
GetModuleHandleA
CreateDirectoryW
CompareStringA
GetEnvironmentStringsA
lstrcmpA
ExpandEnvironmentStringsA
SuspendThread
lstrcmpi
GetHandleInformation
lstrcatA
GetStringTypeW
CreateSemaphoreA
GetProcAddress
EnumTimeFormatsA
GetSystemDefaultLCID
GetNamedPipeInfo
GetCurrentThreadId
GetNumberFormatA
IsBadStringPtrA
GetModuleFileNameA
user32
DrawTextW
GetMessageW
OffsetRect
DialogBoxParamA
SendMessageW
CreateDialogIndirectParamW
LoadBitmapA
SetForegroundWindow
GetDlgItem
MonitorFromPoint
FindWindowW
WaitForInputIdle
CreateWindowExA
MoveWindow
SetWindowTextA
CharUpperA
GetDC
UpdateWindow
UnregisterClassA
GetKeyboardType
ShowWindow
GetClassInfoW
RegisterClassExW
CharNextA
CreateWindowExW
IsDlgButtonChecked
mouse_event
PostMessageA
RegisterClassExA
SetCursorPos
GetMenuItemInfoA
wvsprintfA
CharUpperW
GetCursorPos
GetSystemMetrics
CreateDialogParamA
GetIconInfo
ArrangeIconicWindows
DefWindowProcW
GetClassNameW
GetClassInfoExA
gdi32
BitBlt
GetTextMetricsW
CreateMetaFileW
GetEnhMetaFileA
CreateMetaFileA
EnumFontFamiliesExA
ResizePalette
FlattenPath
CreateFontIndirectW
OffsetClipRgn
GetCharABCWidthsI
SetMapperFlags
RestoreDC
TranslateCharsetInfo
SetBrushOrgEx
GetEnhMetaFileDescriptionA
PtInRegion
advapi32
RegQueryValueW
RegSaveKeyW
RegOpenKeyW
RegRestoreKeyW
RegFlushKey
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueW
RegCreateKeyExW
shlwapi
PathParseIconLocationW
UrlGetLocationW
PathFileExistsW
AssocQueryStringA
UrlCreateFromPathW
PathUndecorateA
StrCmpNIA
PathIsFileSpecW
Sections
.qtJ Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tc Size: 3KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VXtI Size: 3KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.B Size: 4KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 103KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.M Size: 4KB - Virtual size: 479KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ