Static task
static1
Behavioral task
behavioral1
Sample
e457da415447ac364b4ebf7b79304ed4cfd9e8301a7a102c79e1d5ea047b19bb.exe
Resource
win7-20230220-en
General
-
Target
e457da415447ac364b4ebf7b79304ed4cfd9e8301a7a102c79e1d5ea047b19bb.exe
-
Size
117KB
-
MD5
e7c3bb96329979a023016863be6ea4f3
-
SHA1
e90f9bb3897a4e28fc4eb483109b7e4f5d884912
-
SHA256
e457da415447ac364b4ebf7b79304ed4cfd9e8301a7a102c79e1d5ea047b19bb
-
SHA512
52908977540fd869e6a51f79f89bf59fc1e3f05ddcb9d54ecee14ff474853c861cb62631af93e107ed3290dca4b95a64327552e7a1538c3f43901fa4be1d8cb7
-
SSDEEP
3072:1Fk5ZpS7O5WTF/pstBaDqwONnct43bBl3N2Ugt:1tO5WTF/p/uwONct43D92Us
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e457da415447ac364b4ebf7b79304ed4cfd9e8301a7a102c79e1d5ea047b19bb.exe
Files
-
e457da415447ac364b4ebf7b79304ed4cfd9e8301a7a102c79e1d5ea047b19bb.exe.exe windows x86
0ffaf452efe2d9a3cede9d8b263b2526
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord7575
ord2456
ord11865
ord10840
ord12944
ord8073
ord8303
ord7593
ord13031
ord11459
ord5805
ord8305
ord9286
ord5123
ord11103
ord2846
ord2944
ord2945
ord3484
ord11060
ord2338
ord5253
ord12482
ord10672
ord6128
ord13300
ord7074
ord13302
ord2661
ord3984
ord13980
ord3991
ord4401
ord4368
ord4364
ord4398
ord4419
ord4377
ord4406
ord4415
ord4385
ord4389
ord4393
ord4381
ord4410
ord4373
ord1514
ord1507
ord1509
ord1503
ord1496
ord11188
ord11190
ord12644
ord2847
ord8330
ord9994
ord6217
ord11108
ord8070
ord13294
ord10883
ord3395
ord11025
ord8235
ord13973
ord13972
ord14045
ord14062
ord14058
ord14060
ord14061
ord14059
ord2416
ord7349
ord2878
ord2881
ord12531
ord5532
ord2752
ord2973
ord2974
ord9475
ord10360
ord10007
ord8137
ord11067
ord6328
ord6686
ord404
ord963
ord9968
ord8307
ord9282
ord13735
ord3406
ord13717
ord13863
ord13852
ord13875
ord13656
ord14129
ord13651
ord14042
ord12805
ord12608
ord2502
ord4961
ord5514
ord8178
ord3414
ord10016
ord10244
ord8292
ord11648
ord4930
ord11453
ord14124
ord8570
ord2374
ord11822
ord11029
ord3662
ord4881
ord13223
ord4744
ord4735
ord9447
ord14043
ord13803
ord13804
ord13783
ord13814
ord13784
ord6622
ord9190
ord6831
ord884
ord1284
ord11059
ord2015
ord3655
ord8321
ord2337
ord6127
ord8351
ord11154
ord11024
ord2417
ord12535
ord13482
ord7437
ord10253
ord10256
ord8595
ord8610
ord8600
ord9030
ord9034
ord8612
ord10109
ord9512
ord8031
ord8021
ord10697
ord10134
ord9094
ord6345
ord1814
ord6691
ord434
ord986
ord544
ord1068
ord661
ord1128
ord657
ord1124
ord681
ord1141
ord5092
ord8393
ord7667
ord12868
ord3885
ord7170
ord2800
ord12414
ord3893
ord3554
ord13514
ord3860
ord3940
ord7642
ord7801
ord7496
ord12838
ord4317
ord2061
ord2818
ord2056
ord11274
ord13310
ord11297
ord13329
ord6010
ord12119
ord11039
ord691
ord3966
ord10640
ord1929
ord2219
ord3988
ord12261
ord6504
ord6507
ord7640
ord6509
ord6505
ord6508
ord13496
ord13996
ord12749
ord6506
ord13330
ord7521
ord6906
ord8309
ord5252
ord12479
ord13295
ord7069
ord8333
ord2215
ord3985
ord11113
ord11017
ord7348
ord2762
ord4429
ord4430
ord5445
ord11349
ord1524
ord12488
ord5257
ord12486
ord5256
ord10396
ord5273
ord7946
ord8441
ord10752
ord10747
ord4736
ord3401
ord4076
ord10459
ord9422
ord1755
ord9837
ord1745
ord5082
ord10474
ord1577
ord8299
ord8792
ord10467
ord310
ord5098
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9281
ord8304
ord6113
ord4641
ord1627
ord7581
ord3620
ord6680
ord948
ord5776
ord5837
ord3439
ord316
ord901
ord4283
ord1982
ord946
ord385
ord4079
ord2000
ord12962
ord11179
ord10967
ord921
ord345
ord1586
ord850
ord1294
ord6503
ord6857
ord12817
ord7168
ord7143
ord7096
ord7576
ord12672
ord13710
ord1890
ord1981
ord1985
ord7141
ord13869
ord1289
ord889
ord13484
ord13481
ord3409
ord5238
ord11172
ord6835
ord9192
ord11180
ord7355
ord9449
ord11184
ord11153
ord11787
ord4622
ord4903
ord5095
ord5534
ord8439
ord9188
ord2088
ord9185
ord3616
ord1296
msvcr100
__CxxFrameHandler3
memset
_setmbcp
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
_purecall
memcpy
kernel32
LoadLibraryA
InterlockedDecrement
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedIncrement
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
VirtualAlloc
Sleep
OutputDebugStringA
WaitForSingleObject
ResetEvent
CloseHandle
GetProcAddress
user32
RedrawWindow
ClientToScreen
UpdateWindow
EnableWindow
comctl32
InitCommonControlsEx
ws2_32
socket
gethostbyname
htons
connect
recv
closesocket
WSACleanup
send
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ