Static task
static1
Behavioral task
behavioral1
Sample
2bd847b22188ab22d5f15adad5205e373d11758ffacc689b1645b366b6c2e61f.exe
Resource
win7-20240903-en
General
-
Target
2bd847b22188ab22d5f15adad5205e373d11758ffacc689b1645b366b6c2e61f
-
Size
2.9MB
-
MD5
39b79c020a8bd60e30610fa71d20d921
-
SHA1
6060bd45bf76a0c318ecdf0b5cf4d48c41c9b44c
-
SHA256
2bd847b22188ab22d5f15adad5205e373d11758ffacc689b1645b366b6c2e61f
-
SHA512
fe49e03d4d9b7370ffab23f1c46f8966fe33053ea34ca1a4c3d7a88b63bb7cf6595abcd2e989b24e7380586aeb9e15a19c3435a782acd99dcde983a9d45d1e89
-
SSDEEP
24576:9A5seDL0YfwfOAe1TW04z0W7xRGuhY8zcjMgDtQtsYLe4eVyobam+FMAny4/:qtDL0vWAf2W77BjcYWKttLZ7Rh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bd847b22188ab22d5f15adad5205e373d11758ffacc689b1645b366b6c2e61f
Files
-
2bd847b22188ab22d5f15adad5205e373d11758ffacc689b1645b366b6c2e61f.exe windows:5 windows x86 arch:x86
beaf5c0ed5ec5822665cc310a1acf442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundW
msvcrt
__p__commode
_initterm
__getmainargs
_acmdln
_controlfp
__set_app_type
__p__fmode
__setusermatherr
_adjust_fdiv
exit
_except_handler3
_exit
_XcptFilter
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
WriteProcessMemory
WritePrivateProfileStringW
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
LoadLibraryA
LeaveCriticalSection
ExitProcess
GetTickCount
EnterCriticalSection
InitializeCriticalSection
GetCommandLineA
IsValidCodePage
GetCurrentThreadId
SetErrorMode
CloseHandle
CompareStringA
CompareStringW
ConvertDefaultLocale
CreateDirectoryW
CreateFileA
CreateFileW
CreateProcessW
DeleteCriticalSection
DuplicateHandle
EnumResourceLanguagesW
EnumSystemLocalesA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindResourceExW
FindResourceW
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentProcessId
GetDateFormatA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesW
GetFileSize
GetFileTime
GetFileType
GetFullPathNameW
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetVersionExW
GetVolumeInformationW
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFlags
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidLocale
LCMapStringA
LCMapStringW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockFile
LockResource
lstrcmpA
lstrcmpW
lstrlenA
lstrlenW
MulDiv
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadFile
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
user32
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawTextExW
DrawTextW
EnableMenuItem
EnableWindow
EndDialog
EqualRect
FillRect
FindWindowW
GetActiveWindow
GetCapture
GetClassInfoExW
GetClassInfoW
GetClassLongW
GetClassNameW
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
GetLastActivePopup
GetMenu
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMenuItemID
GetMenuState
GetMessagePos
GetMessageTime
GetMessageW
GetNextDlgGroupItem
GetNextDlgTabItem
GetParent
GetPropW
GetScrollInfo
GetScrollPos
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetTopWindow
GetWindowDC
GetWindowPlacement
GetWindowRect
GetWindowRgn
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
GrayStringW
InflateRect
CreateDialogIndirectParamW
InvalidateRect
InvalidateRgn
IsChild
IsDialogMessageW
IsIconic
IsRectEmpty
IsWindowEnabled
IsWindowVisible
KillTimer
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
MapDialogRect
MapWindowPoints
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemovePropW
ScreenToClient
ScrollWindow
SendDlgItemMessageA
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemBitmaps
SetPropW
SetRect
SetRectEmpty
SetScrollInfo
SetTimer
SetWindowContextHelpId
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowWindow
SystemParametersInfoA
SystemParametersInfoW
TabbedTextOutW
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UnregisterClassW
UpdateWindow
ValidateRect
WindowFromPoint
WinHelpW
CopyRect
CopyAcceleratorTableW
ClientToScreen
CheckMenuItem
CharUpperW
CharNextW
CallWindowProcW
CallNextHookEx
GetWindowLongW
GetWindowTextLengthA
IntersectRect
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
comdlg32
GetFileTitleW
advapi32
RegOpenKeyExW
RegEnumKeyW
RegOpenKeyW
RegQueryValueExW
RegQueryValueW
RegSetValueExW
ole32
OleFlushClipboard
CreateILockBytesOnHGlobal
OleIsCurrentClipboard
OleUninitialize
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
StringFromIID
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterMessageFilter
CoGetClassObject
CoCreateGuid
OleInitialize
shlwapi
PathRemoveFileSpecW
PathIsUNCW
PathIsDirectoryW
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
Sections
.text Size: 400KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cfedb6 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dfedb7 Size: 4KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efedb8 Size: 4KB - Virtual size: 30B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.act33 Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE