Static task
static1
Behavioral task
behavioral1
Sample
e584414a7c114306d76b46b42b45b2a9e753ca42e90badce67d2beae1a62c42b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e584414a7c114306d76b46b42b45b2a9e753ca42e90badce67d2beae1a62c42b.exe
Resource
win10v2004-20230220-en
General
-
Target
e584414a7c114306d76b46b42b45b2a9e753ca42e90badce67d2beae1a62c42b
-
Size
142KB
-
MD5
a00bd01a58bac5152a0af37cbb861efd
-
SHA1
d27fb1cb4c1ba7662d2f4939f72a657eadcc5480
-
SHA256
e584414a7c114306d76b46b42b45b2a9e753ca42e90badce67d2beae1a62c42b
-
SHA512
c099d471d2054107d289aa486964fa324dcd277cfcea3a2cdb7ef1e205bf7c9f300f05347f66b7f55d95ec6391c8a899c018ec23b6d377608b8ca2e85f048b56
-
SSDEEP
3072:IU9HogzLgnThT5Px81H3ia7gIbVThr2h3RsOb1Zx:IU9HoCgnTFCXMcBhrA/pZx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e584414a7c114306d76b46b42b45b2a9e753ca42e90badce67d2beae1a62c42b
Files
-
e584414a7c114306d76b46b42b45b2a9e753ca42e90badce67d2beae1a62c42b.exe windows x86
14eeea00f811b54aceb3964ea40923fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
Sleep
GetTickCount
SystemTimeToTzSpecificLocalTime
FindResourceA
FreeResource
LoadResource
SizeofResource
LockResource
GetShortPathNameW
VirtualFree
GetProcAddress
VirtualAlloc
GetModuleHandleA
VirtualProtect
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
FileTimeToSystemTime
RaiseException
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
HeapSize
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
CreateFileW
CloseHandle
FlushFileBuffers
FindFirstFileW
WideCharToMultiByte
IsProcessorFeaturePresent
MultiByteToWideChar
advapi32
CryptAcquireContextA
CryptGetKeyParam
CryptSetKeyParam
CryptReleaseContext
CryptImportKey
CryptDestroyKey
CryptDecrypt
StartServiceW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ControlService
DeleteService
QueryServiceStatusEx
ws2_32
WSAStartup
wininet
InternetGetConnectedState
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 357KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ