Static task
static1
Behavioral task
behavioral1
Sample
e09f421f7d1f8601382ba06f8.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
e09f421f7d1f8601382ba06f8.exe
Resource
win10v2004-20230703-en
General
-
Target
e09f421f7d1f8601382ba06f8.exe
-
Size
2.4MB
-
MD5
76172b8704c46cfb5565920279e6f41b
-
SHA1
ac3441c0f0e89e64a71c107fbb8ba98994d63b45
-
SHA256
e09f421f7d1f8601382ba06f854360dce742321bb0d9b1433374cd1dc7cc4490
-
SHA512
ffdd7f195f1b1514a552ad9f718c5b30adbea9341833247924e287ccb71c3c03f652c5b8c52d7c7acdf5fd1172b106716031363b72677e40862893b244c62385
-
SSDEEP
49152:2Ry8Fji0FXP4Op3BsiBAi/z95pQJuGi+7dxxcR0h8Pbc+xXXGFbSLWHHOXl:J23BsgL4HOXl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e09f421f7d1f8601382ba06f8.exe
Files
-
e09f421f7d1f8601382ba06f8.exe.exe windows x64
8389a06a9956a476e94286bdab2ed4a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
htons
connect
WSAStartup
socket
send
recv
inet_addr
crypt32
CryptStringToBinaryA
kernel32
WriteConsoleW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
SetEnvironmentVariableA
ReadConsoleW
RtlCaptureContext
VirtualAlloc
CreateThread
Sleep
WriteFile
ReadFile
CreateFileA
FreeLibrary
GetProcAddress
HeapFree
GetProcessHeap
GetModuleHandleA
GetLastError
WideCharToMultiByte
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
SetEndOfFile
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlPcToFileHeader
RaiseException
RtlUnwindEx
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapAlloc
HeapReAlloc
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetTimeZoneInformation
user32
EnumChildWindows
MessageBoxW
ole32
CoCreateGuid
rpcrt4
UuidFromStringA
Sections
.text Size: 953KB - Virtual size: 952KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 534KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 205KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ