Static task
static1
Behavioral task
behavioral1
Sample
b2db22269f28f46b2ecde54006024600N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2db22269f28f46b2ecde54006024600N.exe
Resource
win10v2004-20240802-en
General
-
Target
b2db22269f28f46b2ecde54006024600N
-
Size
4.7MB
-
MD5
b2db22269f28f46b2ecde54006024600
-
SHA1
2a22185a93fc85a22ff8e82ee5acfd87f16ae3d2
-
SHA256
95d08af22aa599d9d1e414db90c90752ad097f5e15c06130a4b1eb2c9e4cb155
-
SHA512
412e7c96421afe59cf4483236e6292742ac1038aa2872bd6a6fcc70e88e76fea59913f448931e678ca8fe1b8ff69d95cd52bba69c7267c93591a2a21fecfabda
-
SSDEEP
98304:iL4haQXjH+pdg0qYQEssReoaZgLES87IaadOL:po6jepdgdZOph/OL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2db22269f28f46b2ecde54006024600N
Files
-
b2db22269f28f46b2ecde54006024600N.exe windows:4 windows x86 arch:x86
6f1123b8a7511eca2b393463f7e1db4a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
FlushFileBuffers
FlushInstructionCache
FreeResource
GetACP
GetCurrentDirectoryW
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetExitCodeThread
GetFileAttributesW
GetLastError
GetLocaleInfoA
GetLocalTime
GetLogicalDriveStringsW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetProcessHeap
GetProcessTimes
GetStartupInfoW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetThreadLocale
GetThreadPriority
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalGetAtomNameW
GlobalLock
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsProcessorFeaturePresent
GetSystemPowerStatus
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenEventW
OpenFileMappingW
OpenMutexW
OpenProcess
OutputDebugStringA
OutputDebugStringW
QueryDosDeviceW
QueryPerformanceCounter
RaiseException
ReadFile
FindResourceExW
ReleaseMutex
RemoveDirectoryW
ResetEvent
ResumeThread
SetCurrentDirectoryW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeW
WideCharToMultiByte
WinExec
WriteFile
WritePrivateProfileSectionW
WritePrivateProfileStringW
WriteProcessMemory
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
GetOEMCP
GetCPInfo
GetStringTypeW
GetStringTypeA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentProcess
TlsGetValue
TlsAlloc
TlsSetValue
HeapCreate
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
ExitProcess
GetVersion
GetStartupInfoA
RtlUnwind
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateProcessW
CreateMutexW
CreateFileW
CreateFileMappingW
CreateProcessA
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
GetCommandLineW
GetFileType
GetConsoleMode
LoadLibraryA
GetProcAddress
ReadProcessMemory
FreeLibrary
user32
ScreenToClient
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetRectEmpty
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowWindow
SystemParametersInfoW
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WindowFromPoint
wsprintfW
RegisterWindowMessageW
ReleaseDC
PtInRect
PostThreadMessageW
PostQuitMessage
PostMessageW
PeekMessageW
OffsetRect
MoveWindow
MapWindowPoints
LoadImageW
LoadIconW
LoadCursorW
LoadBitmapW
KillTimer
IsWindowVisible
IsWindowEnabled
IsIconic
IsDialogMessageW
IsChild
InvalidateRect
IntersectRect
InflateRect
GetWindowThreadProcessId
GetWindowRect
GetWindowLongW
GetSystemMetrics
RegisterClassExW
ReleaseCapture
GetScrollPos
GetParent
GetNextDlgTabItem
GetMessageW
GetKeyState
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassInfoExW
GetActiveWindow
FindWindowW
FindWindowExW
FindWindowA
ExitWindowsEx
EqualRect
EnumDisplaySettingsW
EnableWindow
DrawTextW
DrawIconEx
DispatchMessageW
DestroyWindow
DestroyIcon
DefWindowProcW
CreateWindowExW
CopyRect
ClientToScreen
CharNextW
CharLowerW
GetDialogBaseUnits
GetDlgCtrlID
MessageBoxA
advapi32
AdjustTokenPrivileges
CloseServiceHandle
CreateProcessAsUserW
DuplicateTokenEx
GetSecurityDescriptorSacl
GetTokenInformation
InitializeSecurityDescriptor
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExA
RegEnumKeyExW
RegOpenKeyExA
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
ChangeServiceConfigW
shell32
CommandLineToArgvW
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.hss5 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 352KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iss5 Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE