Static task
static1
Behavioral task
behavioral1
Sample
e8535c5419a1fe18eafb162b366e4350e264bc39e49c08ec8be88c38eb6e2e52.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e8535c5419a1fe18eafb162b366e4350e264bc39e49c08ec8be88c38eb6e2e52.exe
Resource
win10v2004-20230220-en
General
-
Target
e8535c5419a1fe18eafb162b366e4350e264bc39e49c08ec8be88c38eb6e2e52
-
Size
1.1MB
-
MD5
dfefba8a2e1684999256bdf218ff54e1
-
SHA1
eb480d2af2132b7da67cd53cbde80e9e04f511ba
-
SHA256
e8535c5419a1fe18eafb162b366e4350e264bc39e49c08ec8be88c38eb6e2e52
-
SHA512
25f600b97a4366c059aaa8eca7896c7a4e00ea54426a13de53eba4097bbdce59445867aeb94541077397b551434d11ba8574891a4bfb9d3b4700a346e275945f
-
SSDEEP
24576:X+/HQxgMvQeKejK2LZnEwRR20R0dnuUnqk8ZCYa0ijsLS9p:X+/Yhjpq0RsuUnqk8ZCYa0TLS9p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e8535c5419a1fe18eafb162b366e4350e264bc39e49c08ec8be88c38eb6e2e52
Files
-
e8535c5419a1fe18eafb162b366e4350e264bc39e49c08ec8be88c38eb6e2e52.exe windows x86
fbba82118333bf8684059b0e3dceacbb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord603
ord1969
ord273
ord5440
ord2740
ord879
ord6383
ord2801
ord882
ord2301
ord2298
ord3089
ord4476
ord6334
ord283
ord537
ord6877
ord801
ord6283
ord4171
ord6883
ord541
ord3301
ord6143
ord2358
ord2289
ord2370
ord5951
ord6134
ord3874
ord3095
ord6442
ord6008
ord4000
ord3303
ord922
ord926
ord3496
ord3287
ord5981
ord4129
ord5683
ord6385
ord6876
ord5442
ord3318
ord941
ord3176
ord939
ord4224
ord1175
ord2820
ord3811
ord3873
ord1105
ord5710
ord690
ord1988
ord5355
ord5356
ord5207
ord389
ord3721
ord795
ord4275
ord3571
ord3693
ord755
ord640
ord4133
ord4297
ord5787
ord5788
ord2754
ord6172
ord5875
ord5873
ord5785
ord1640
ord323
ord470
ord535
ord6930
ord5450
ord6394
ord610
ord6139
ord287
ord6927
ord3742
ord818
ord3610
ord656
ord1783
ord4055
ord2587
ord4406
ord3394
ord3729
ord3711
ord783
ord804
ord2086
ord2112
ord6785
ord1088
ord2431
ord6781
ord539
ord4299
ord2380
ord6880
ord5148
ord3752
ord6128
ord6597
ord6650
ord6591
ord6807
ord6857
ord6823
ord6855
ord6832
ord6859
ord6867
ord6847
ord6814
ord6839
ord6846
ord6858
ord6816
ord6815
ord6812
ord6845
ord6808
ord6835
ord4589
ord4588
ord4899
ord4370
ord4892
ord6817
ord5076
ord4340
ord4347
ord4720
ord4889
ord4531
ord3663
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5281
ord3748
ord1725
ord5260
ord6614
ord6691
ord4432
ord6514
ord6478
ord6800
ord6453
ord6241
ord6856
ord6803
ord2575
ord4396
ord3574
ord609
ord2938
ord6929
ord2753
ord3619
ord3370
ord2582
ord4402
ord3640
ord693
ord4243
ord6242
ord6696
ord3286
ord4400
ord3630
ord682
ord2450
ord2567
ord2089
ord4284
ord6762
ord6905
ord3698
ord765
ord2080
ord6662
ord6170
ord6311
ord5861
ord2763
ord6282
ord2362
ord4123
ord2363
ord6136
ord4130
ord3329
ord3708
ord781
ord1756
ord6741
ord6508
ord5857
ord6920
ord4277
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord692
ord2764
ord4204
ord472
ord3220
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord6117
ord2621
ord6438
ord1134
ord2725
ord6059
ord774
ord686
ord1168
ord502
ord384
ord2096
ord4278
ord2784
ord668
ord1980
ord3310
ord2781
ord2770
ord356
ord3876
ord4202
ord2546
ord1176
ord291
ord2713
ord3763
ord923
ord925
ord4694
ord3733
ord810
ord4271
ord3914
ord4125
ord2294
ord2078
ord6928
ord536
ord6663
ord2116
ord3626
ord3573
ord1146
ord1644
ord2863
ord6270
ord2438
ord3654
ord2584
ord4220
ord6380
ord6378
ord1779
ord354
ord5186
ord823
ord1979
ord1200
ord665
ord2614
ord3317
ord616
ord567
ord3582
ord4424
ord3402
ord5290
ord4398
ord1776
ord6055
ord2578
ord4218
ord2023
ord2411
ord1768
ord3520
ord6401
ord3522
ord858
ord924
ord3521
ord6403
ord6402
ord6215
ord2642
ord2818
ord3097
ord5241
ord293
ord2513
ord2414
ord1641
ord289
ord2860
ord5789
ord6199
ord613
ord5953
ord2827
ord5802
ord2915
ord5572
ord2864
ord6197
ord2379
ord4710
ord3092
ord2122
ord4287
ord4376
ord4853
ord3797
ord5280
ord4234
ord324
ord556
ord641
ord809
ord540
ord860
ord800
ord3996
ord3998
ord6907
ord6007
ord2302
ord825
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord4353
ord6374
ord5163
ord2385
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4545
ord5265
ord1576
msvcrt
__set_app_type
__CxxFrameHandler
_purecall
strtoul
strtol
_mbscmp
strtok
strtod
_setmbcp
_swab
_strupr
_itoa
_strdup
_strrev
_strnicmp
_stricmp
iscntrl
_ftol
vsprintf
vfprintf
_CIpow
sprintf
fprintf
fopen
fclose
strchr
strncmp
_mbsicmp
time
strrchr
free
_fullpath
calloc
_mbsicoll
strstr
sscanf
_CxxThrowException
isspace
realloc
malloc
isdigit
isxdigit
strspn
fgets
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_controlfp
kernel32
Sleep
GetTickCount
ClearCommError
HeapReAlloc
ReadFile
GetOverlappedResult
GetModuleFileNameA
GetCurrentDirectoryA
GetTempPathA
SetCurrentDirectoryA
GetTempFileNameA
GetProcessHeap
HeapAlloc
DeleteFileA
HeapFree
WritePrivateProfileStringA
SetEnvironmentVariableA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleHandleA
WriteFile
GetPrivateProfileStringA
HeapSize
CopyFileA
lstrcpyA
GetPrivateProfileStructA
WritePrivateProfileStructA
GetLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
CreateMutexA
GetUserDefaultLangID
GetSystemDefaultLangID
LoadLibraryA
ReleaseMutex
FreeLibrary
LocalFree
FormatMessageA
lstrlenA
GetShortPathNameA
FindClose
FindFirstFileA
GetFileSize
GetSystemDirectoryA
GetWindowsDirectoryA
SetStdHandle
CreatePipe
GetStdHandle
RemoveDirectoryA
PurgeComm
SetCommState
GetCommState
SetCommTimeouts
SetupComm
CreateFileA
GetLastError
CreateEventA
DeviceIoControl
SetEvent
ResetEvent
QueryPerformanceCounter
GetStartupInfoA
CancelIo
GlobalSize
CreateDirectoryA
ResumeThread
SuspendThread
lstrcpynA
GetEnvironmentVariableA
GetCurrentProcess
GetProcAddress
user32
GetSystemMenu
AppendMenuA
CheckMenuItem
LoadIconA
EnumWindows
ClientToScreen
GetWindowLongA
LoadCursorA
SetCursor
GetSysColor
FillRect
BringWindowToTop
AnimateWindow
SendMessageA
EnableWindow
GetClientRect
LoadImageA
DestroyIcon
SystemParametersInfoA
InflateRect
GetScrollPos
EqualRect
DrawTextExA
GetTabbedTextExtentA
DrawTextA
GetDialogBaseUnits
SetForegroundWindow
SetMenuItemBitmaps
SetScrollPos
LoadAcceleratorsA
UnregisterDeviceNotification
GetCursorPos
ReleaseCapture
SetCapture
InvalidateRect
EnumChildWindows
GetWindow
GetMenu
GetMenuItemCount
GetMenuItemID
PeekMessageA
TranslateMessage
DispatchMessageA
SetMenu
TranslateAcceleratorA
GetCapture
ScreenToClient
PtInRect
PostMessageA
GetWindowTextA
MessageBeep
SetWindowTextA
GetKeyState
GetFocus
IsWindowVisible
KillTimer
SetTimer
LoadMenuA
GetSubMenu
LoadBitmapA
UpdateWindow
GetDesktopWindow
CheckMenuRadioItem
GetDlgCtrlID
WindowFromPoint
RegisterDeviceNotificationA
IsWindow
SetCaretPos
HideCaret
SetWindowLongA
EnableScrollBar
BeginPaint
wsprintfA
EndPaint
CreateCaret
ShowCaret
DestroyCaret
DefWindowProcA
GetScrollInfo
SetScrollInfo
CreatePopupMenu
TrackPopupMenu
SetFocus
GetClipboardData
GetClassInfoA
RegisterClassA
GetClassInfoW
RegisterClassW
EnableMenuItem
CopyRect
GetParent
GetWindowRect
OpenClipboard
GetWindowTextLengthW
CloseClipboard
GetWindowTextW
EmptyClipboard
SetClipboardData
GetSystemMetrics
gdi32
Polyline
SetBkColor
SetTextColor
DeleteObject
DeleteDC
GetCurrentObject
GetStockObject
GetObjectA
GetTextExtentPoint32A
Arc
Ellipse
Polygon
CreateFontIndirectA
GetBitmapBits
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
Rectangle
SetPixel
BitBlt
CreateSolidBrush
SelectObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegSetValueExA
RegCreateKeyA
RegSetValueA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
ImageList_SetBkColor
ImageList_AddMasked
ImageList_GetImageCount
ImageList_Draw
_TrackMouseEvent
ole32
CoInitialize
CoUninitialize
setupapi
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdA
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
hid
HidD_GetProductString
HidD_SetOutputReport
HidD_GetInputReport
HidD_SetFeature
HidD_GetFeature
HidP_GetSpecificButtonCaps
HidP_GetSpecificValueCaps
HidD_GetHidGuid
HidD_GetAttributes
HidD_GetPreparsedData
HidP_GetCaps
HidD_FreePreparsedData
HidD_GetManufacturerString
shlwapi
PathFindExtensionA
PathFindFileNameA
PathIsFileSpecA
PathRemoveFileSpecA
PathAddBackslashA
PathFileExistsA
PathCompactPathA
PathRemoveExtensionA
iphlpapi
GetAdaptersInfo
gdiplus
GdipFillEllipseI
GdipFree
GdipCloneBrush
GdipAlloc
GdipCreateFromHDC
GdipCreatePen1
GdipCreateSolidFill
GdipFillPolygonI
GdipDrawLinesI
GdipDrawBeziers
GdipDrawLineI
GdipDeletePen
GdipFillRectangleI
GdipDeleteBrush
GdipDeleteGraphics
GdiplusStartup
GdiplusShutdown
GdipSetSmoothingMode
Sections
.text Size: 548KB - Virtual size: 546KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 216KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ