Static task
static1
Behavioral task
behavioral1
Sample
2IFYYPRUgO.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2IFYYPRUgO.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
2IFYYPRUgO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
2IFYYPRUgO.exe
Resource
win11-20240802-en
General
-
Target
2IFYYPRUgO.exe
-
Size
447KB
-
MD5
dd9983e56e44b300e97fbead17bbb8ec
-
SHA1
bcfc4f542d1824b23b5beefe94e8eaa9d487e037
-
SHA256
16c9a4debb518681ece83ec9f4eb3edfab08cc4231243db1949a64c80e017aa4
-
SHA512
02663157f5a109a122897fb0ac32eda38a9ed5d289b70ef1541e3ca800e02a41d471879e04d1bd59eb2110e4a0f8cd7851e3bacba04147ffa488997e8a100457
-
SSDEEP
6144:XZBpoyz+AlKudZ10mVtZ4ELIgjdo7d5UNo4MaGSlrLo5FXCnFk:Xruyz+PMZ10mVrLL/27gWxerCSC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2IFYYPRUgO.exe
Files
-
2IFYYPRUgO.exe.exe windows:5 windows x86 arch:x86
de80f36f2a6fc0a853a31d1d9771ee6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommState
InterlockedDecrement
GetCurrentProcess
InterlockedCompareExchange
SetVolumeMountPointW
CreateHardLinkA
GetModuleHandleW
CreateNamedPipeW
EnumCalendarInfoExW
GetNumberFormatA
CreateActCtxW
TlsSetValue
LoadLibraryW
GetLocaleInfoW
GetCalendarInfoA
CreateEventA
GetFileAttributesA
GetTimeFormatW
GetModuleFileNameW
FindNextVolumeMountPointW
GetTempPathW
GetShortPathNameA
CreateJobObjectA
VerifyVersionInfoW
InterlockedExchange
GlobalUnfix
GetLogicalDriveStringsA
GetLastError
GetCurrentDirectoryW
GetProcAddress
GetLongPathNameA
PeekConsoleInputW
EnumSystemCodePagesW
GetConsoleDisplayMode
InterlockedIncrement
LoadModule
GetProcessVersion
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingA
LocalAlloc
GetFileType
FoldStringW
SetEnvironmentVariableA
EnumDateFormatsA
GetProcessShutdownParameters
LoadLibraryExA
GetFileTime
WaitForDebugEvent
OpenEventW
SetFileShortNameA
GetVersionExA
GetDiskFreeSpaceExW
GetWindowsDirectoryW
LocalFree
LCMapStringW
CommConfigDialogW
CloseHandle
GetStringTypeW
MultiByteToWideChar
CreateFileW
WriteConsoleW
RaiseException
GetConsoleAliasExesLengthA
SetEndOfFile
GetConsoleAliasExesA
EnumCalendarInfoA
GlobalMemoryStatus
SetComputerNameA
SetDefaultCommConfigA
HeapSize
FlushFileBuffers
SetStdHandle
IsValidCodePage
HeapAlloc
HeapReAlloc
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
WriteFile
HeapCreate
HeapFree
SetFilePointer
TlsAlloc
TlsGetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
user32
SetCaretPos
GetMenuStringA
LoadMenuA
InsertMenuItemW
GetMenu
DrawStateA
GetWindowLongW
GetSysColor
CharUpperA
gdi32
GetBkMode
GetCharWidthFloatA
CreateDCA
GetCharWidth32W
GetTextCharset
GetCharWidthI
winhttp
WinHttpConnect
msimg32
GradientFill
Sections
.text Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ