Static task
static1
Behavioral task
behavioral1
Sample
2b9a2fb1e7546e8983e52b49a3778b90N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2b9a2fb1e7546e8983e52b49a3778b90N.exe
Resource
win10v2004-20240802-en
General
-
Target
2b9a2fb1e7546e8983e52b49a3778b90N.exe
-
Size
223KB
-
MD5
2b9a2fb1e7546e8983e52b49a3778b90
-
SHA1
a9050b3f7e0304e5339049f2debec3526a33898a
-
SHA256
942f0ec52c0528ea2d63b0b96885733f06f6f7a6094b39c4a0cda1f6de03f525
-
SHA512
82c242d9e9e64e56df90d97e02b53c523c311fd9fd1cda7cc230ee72bb443d7818c441151efaf37119fc6997d42713d8f188e59bc3e6ab8f758a7d4488a40a51
-
SSDEEP
3072:QZxCVygvZaFVmEa4Tb9YzoXVwEWIqk9XAUpWy14QOsgBLdFBnfKaS2C+I7JkM:QZxngZSrTb2MX+Edqk9XZ9CQODFI7GM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b9a2fb1e7546e8983e52b49a3778b90N.exe
Files
-
2b9a2fb1e7546e8983e52b49a3778b90N.exe.exe windows:5 windows x86 arch:x86
a8f4d6399c0f020f33fdaa2b8627e2a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
MapViewOfFile
UnmapViewOfFile
GetFileAttributesW
HeapCompact
WriteFile
GetCurrentDirectoryW
EnumSystemCodePagesW
GetModuleHandleW
FindNextFileW
FindClose
GetModuleFileNameW
GetCommandLineW
SetCurrentDirectoryW
GetFileType
GetVersionExW
SetErrorMode
GetUserDefaultLCID
GetStringTypeExW
GetACP
GlobalSize
GetStdHandle
Sleep
PeekNamedPipe
GetTickCount
SetFilePointer
ReadFile
SetLastError
DeviceIoControl
GetFileSize
GetLastError
CloseHandle
IsValidCodePage
GlobalReAlloc
LocalAlloc
LocalLock
LocalSize
LocalUnlock
LocalFree
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
IsBadReadPtr
LoadLibraryW
GetProcAddress
GetProcessHeap
HeapAlloc
HeapFree
FreeLibrary
MulDiv
MultiByteToWideChar
WideCharToMultiByte
HeapSize
LoadLibraryA
HeapReAlloc
VirtualAlloc
RtlUnwind
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
ExitProcess
RaiseException
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ole32
CoInitializeEx
CoUninitialize
gdi32
PatBlt
BitBlt
CreateCompatibleBitmap
DeleteEnhMetaFile
EnumEnhMetaFile
GetEnhMetaFileBits
SetAbortProc
StartDocW
EndDoc
StartPage
ExtEscape
EndPage
CreateDCW
MoveToEx
SetTextColor
SetBkColor
TextOutA
TextOutW
GetCurrentPositionEx
GetTextMetricsW
CreateFontIndirectW
GetTextExtentPoint32A
GetCharWidth32W
SelectClipRgn
CreateRectRgnIndirect
SetICMMode
SetBrushOrgEx
SetTextAlign
PlayEnhMetaFile
SetStretchBltMode
CreateCompatibleDC
CreateDIBSection
SetDIBitsToDevice
StretchDIBits
DeleteDC
SetEnhMetaFileBits
GetEnhMetaFileHeader
GetEnhMetaFilePaletteEntries
GetPaletteEntries
CreatePalette
DeleteObject
CreateSolidBrush
GetDeviceCaps
SelectPalette
RealizePalette
SelectObject
GetTextExtentExPointW
GetBkColor
GetBkMode
SetBkMode
GetObjectW
GetTextExtentPoint32W
shell32
DragFinish
DragAcceptFiles
DragQueryFileW
user32
ValidateRect
ReplyMessage
WindowFromPoint
GetSystemMetrics
SetCapture
ReleaseCapture
GetClipboardFormatNameW
ScrollDC
ScrollWindow
MoveWindow
GetSysColor
TrackPopupMenu
GetMenuItemCount
SetScrollInfo
CreatePopupMenu
CheckMenuRadioItem
GetMenuStringW
RegisterClipboardFormatW
GetClipboardData
GetWindowLongW
EnumClipboardFormats
AppendMenuW
GetMenuStringA
AppendMenuA
OpenClipboard
EndDialog
GetDlgItem
SendDlgItemMessageW
SetDlgItemTextW
IsRectEmpty
CreateDialogParamW
IsDialogMessageW
EnableWindow
RegisterWindowMessageW
LoadIconW
RegisterClassW
CreateWindowExW
IsWindow
DestroyMenu
DestroyWindow
BeginPaint
EndPaint
SetWindowLongW
ShowWindow
HideCaret
DrawTextW
PeekMessageW
UpdateWindow
SetMenu
EmptyClipboard
SetClipboardData
CloseClipboard
DestroyCaret
CreateCaret
ShowCaret
GetParent
PostQuitMessage
SetTimer
GetCursorPos
ScreenToClient
GetWindowTextW
GetMessageW
TranslateMessage
DispatchMessageW
GetKeyState
GetScrollInfo
KillTimer
SetFocus
wsprintfW
LoadCursorW
SetClassLongW
SetCursor
GetMessageTime
PtInRect
GetAsyncKeyState
DefWindowProcW
GetWindowPlacement
GetClientRect
GetWindowRect
SetWindowPos
IsIconic
IsWindowVisible
PostMessageW
SetForegroundWindow
GetFocus
SetCaretPos
GetDC
ReleaseDC
SendMessageW
ClientToScreen
InvalidateRect
SetWindowTextW
GetForegroundWindow
CountClipboardFormats
pplib32w
_MakeTempEntry@12
_NextParameter@4
_LoadWinAPI@16
_DrawBMP@16
_GetRegString@20
_LoadBMP@12
_FreeBMP@4
_GetExtentionMenu@12
_VFSSHContextMenu@20
_tInputEx@4
_PP_AddMenu@24
_SetCustStringTable@16
_PPvViewName@4
_WriteHistory@16
_VFSCheckImage@16
_GetDesktopRect@8
_PutShiftCode@8
_GetTextFromCF_SHELLIDLIST@16
_PPxDialogBoxParam@20
_CatPath@12
_FindFirstFileL@8
_BusyPPx@8
_PPxDialogHelper@16
_CenterWindow@4
_FixCharlengthTable@4
_PPxView@12
_PPxGetHWND@4
_ComExec@12
_EnumHistory@8
_InitDynamicMenu@12
_FixUxTheme@8
_InitSystemDynamicMenu@8
_PPxRegGetIInfo@4
_PPcGetWindow@8
_PPxRegist@12
_FreeDynamicMenu@4
_MessageText@4
_LocalizeDialogText@8
_GetPPxFont@12
_CreateToolBar@24
_GetOptionParameter@12
_Strupr@4
_PPErrorMsg@8
_FormatNumber@20
_ThAppend@12
_CallModule@16
_PP_ExtractMacro@24
_GetToolBarCmd@12
_SetToolBarTipText@12
_GetCustTable@16
_GetPPxhWndFromID@12
_PPxCommonCommand@12
_GetCustData@12
_CommandDynamicMenu@12
XMessage
_PPxCommonExtCommand@8
_PPxRegisterThread@4
_ForceSetForegroundWindow@4
_PPxMenuProc@16
_DynamicMenu_InitMenu@12
_DynamicMenu_InitPopupMenu@12
_GetShiftKey@0
_VFSOn@4
_VFSOff@0
_SystemDynamicMenu@12
_PPxPostMessage@12
_SkipSpace@4
_GetNumber@4
_VFSFixPath@16
_GetFileAttributesL@4
_PPxHelp@12
_PMessageBox@16
_SetCustTable@16
_PPxShellExecute@28
_PPEui@12
_tInput@24
_SetCustData@12
_ExecKeyCommand@12
_ThSize@8
_GetColor@8
_FreeFN_REGEXP@4
_FilenameRegularExpression@8
_MakeFN_REGEXP@8
_EnumCustTable@20
_ThFree@4
_FindExtSeparator@4
_VFSFindLastEntry@4
_GetLineParam@8
_ThGetString@16
_ThInit@4
_VFSGetFileType@16
_VFSGetArchivefileImage@32
_CreateFileL@28
_FindPathSeparator@4
_VFSLoadFileImage@20
_VFSGetRealPath@12
_VFSFullPath@12
_VFSGetDriveType@12
_PPErrorBox@12
_ThCatStringA@8
_GetImageByHttp@8
_FreePPx@0
_SearchHistory@8
_UsePPx@0
_DeleteFileL@4
_LoadTextImage@16
_ThSetString@12
_ThAddString@8
_GetTextCodeType@8
_CheckRunAs@0
_ThCatString@8
_VFSGetDibDelay@28
Sections
.text Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ