Behavioral task
behavioral1
Sample
2db2f4293e146940cd3ca22ccee578e570507803dead3f33117b0deea6f53bda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2db2f4293e146940cd3ca22ccee578e570507803dead3f33117b0deea6f53bda.exe
Resource
win10v2004-20250211-en
General
-
Target
2db2f4293e146940cd3ca22ccee578e570507803dead3f33117b0deea6f53bda.exe
-
Size
414KB
-
MD5
5368c308af8309844113292f2919eabb
-
SHA1
a742f967ae6b605350fa820b6bc131073a28192c
-
SHA256
2db2f4293e146940cd3ca22ccee578e570507803dead3f33117b0deea6f53bda
-
SHA512
a921263d7f4a5b4b0514d738c23e5fa6df0cc5b8e49a0603284f4efb29c3187ce3a21ee60620e68a9746101ad803b02ea96de83282c66f9738399037f127e4eb
-
SSDEEP
6144:66kMYlOIa6VkctankhTl2DGl8HdZRw9wMUCH:62X8anaAZq
Malware Config
Signatures
-
Darkvision family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2db2f4293e146940cd3ca22ccee578e570507803dead3f33117b0deea6f53bda.exe
Files
-
2db2f4293e146940cd3ca22ccee578e570507803dead3f33117b0deea6f53bda.exe.exe windows:5 windows x64 arch:x64
cc12e3f394a2cfaeb0c35364d40acf00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WaitForSingleObject
GetWindowsDirectoryW
GetTempPathW
OpenEventW
LoadLibraryW
TerminateProcess
ExitProcess
lstrcpyW
lstrlenW
GetCurrentProcess
GetSystemDirectoryW
GetModuleFileNameW
LocalFree
CreateProcessW
LocalAlloc
lstrcmpiW
lstrcpyA
CloseHandle
GetLastError
GetProcAddress
GetModuleHandleW
lstrlenA
FileTimeToSystemTime
CreateThread
lstrcmpA
SetEvent
WaitForMultipleObjects
CreateMutexW
OpenMutexW
GetModuleHandleA
VirtualProtect
VirtualAlloc
VirtualFree
LoadLibraryA
ReadFile
GetFileSize
CreateFileW
CreateEventW
GetTickCount64
GetCurrentProcessId
ReleaseMutex
Sleep
HeapReAlloc
WriteConsoleW
SetStdHandle
LCMapStringW
GetStringTypeW
HeapSize
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetTickCount
FlushFileBuffers
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
GetCommandLineA
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapFree
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
user32
DispatchMessageW
wsprintfW
DefWindowProcW
RegisterClassW
GetMessageW
TranslateMessage
wsprintfA
DestroyWindow
UnregisterClassW
PostMessageW
CreateWindowExW
ole32
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 151KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ