Static task
static1
Behavioral task
behavioral1
Sample
e36099a8ffebc501c3d1b8325a103b62769c5ac2630989ea3ea66715022a062f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e36099a8ffebc501c3d1b8325a103b62769c5ac2630989ea3ea66715022a062f.exe
Resource
win10-20230220-en
General
-
Target
e36099a8ffebc501c3d1b8325a103b62769c5ac2630989ea3ea66715022a062f
-
Size
6.0MB
-
MD5
02eceb12980e60c1496eb6b9a02d3483
-
SHA1
fc391210da8753222ba357db7c70397dd73c396e
-
SHA256
e36099a8ffebc501c3d1b8325a103b62769c5ac2630989ea3ea66715022a062f
-
SHA512
822c56b3c64ca467ea2d01a2380bf78f600cd6a1a1f4075facf255f4bc24f4847cb3cd4edaa728e1b8bcb7a699e1872b396c6b78f9fc88deec5e3a1e610051e7
-
SSDEEP
98304:z4S0clXTS9EIv1281Ey0l6iEz0JzA3+rBAlrHC3dNtCLChF:l/lX3I9R1EFlnxJzVA1ALI+hF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e36099a8ffebc501c3d1b8325a103b62769c5ac2630989ea3ea66715022a062f
Files
-
e36099a8ffebc501c3d1b8325a103b62769c5ac2630989ea3ea66715022a062f.exe windows x86
9f8af27f520ea359d999bd8cba16dec6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
MultiByteToWideChar
GetProcAddress
LoadLibraryA
GetModuleFileNameA
WinExec
CloseHandle
WideCharToMultiByte
WriteFile
GetSystemTime
ReadFile
FlushFileBuffers
GetFileTime
GetLastError
SystemTimeToFileTime
CreateFileA
GetTempPathA
Sleep
CreateMutexA
ExitProcess
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleA
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
shlwapi
PathFileExistsA
crypt32
CryptStringToBinaryA
CertOpenStore
CertFreeCertificateContext
CertAddCertificateContextToStore
CertCloseStore
CertCreateCertificateContext
CertGetCertificateContextProperty
winhttp
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpReadData
WinHttpSendRequest
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5.4MB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 484KB - Virtual size: 489KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ