Static task
static1
Behavioral task
behavioral1
Sample
Malicious_e4c5e7ef00400ee70944cae8e01fa24e0afb9d769a767ee0943b6c2bec692342.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_e4c5e7ef00400ee70944cae8e01fa24e0afb9d769a767ee0943b6c2bec692342.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_e4c5e7ef00400ee70944cae8e01fa24e0afb9d769a767ee0943b6c2bec692342.exe
-
Size
64KB
-
MD5
53c020f3a670ba599708777bd90549a7
-
SHA1
e00d17d966557f634f199b306a481db4911b6928
-
SHA256
e4c5e7ef00400ee70944cae8e01fa24e0afb9d769a767ee0943b6c2bec692342
-
SHA512
0d20e27af89824425f67b56f921557ad9c2739d847819a9cfb0c6c050b8c50a53dde77da2004835a130c4e0d37da0ef06b907c943f5c607b3002192eede5e317
-
SSDEEP
1536:u7XWwjY239rgUE9NSSUgW1jn4dPcxnOA7O2QUiIfN85Zstg:u7GsY2JKo3vNnNpO0O2QUiIfN85ZD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_e4c5e7ef00400ee70944cae8e01fa24e0afb9d769a767ee0943b6c2bec692342.exe
Files
-
Malicious_e4c5e7ef00400ee70944cae8e01fa24e0afb9d769a767ee0943b6c2bec692342.exe.exe windows x64
be80bdf22d9bcefc866901ead7ddbcb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateEventA
WaitForSingleObject
SetConsoleCtrlHandler
CreateProcessA
SetEvent
Sleep
TerminateProcess
GetCurrentProcess
GetCurrentProcessId
OpenProcess
CloseHandle
GetLastError
QueryDosDeviceA
FreeLibrary
LoadLibraryA
GetModuleFileNameA
GetProcAddress
MultiByteToWideChar
HeapAlloc
HeapFree
GetCommandLineA
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
HeapSetInformation
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapReAlloc
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
advapi32
StartServiceA
ControlService
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateServiceA
ChangeServiceConfig2A
OpenSCManagerA
OpenServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ