Static task
static1
Behavioral task
behavioral1
Sample
e5fd0cd5236b8a14e957049d52e422ac1da98077c8f37141cd1a8d0e3938d1b9.exe
Resource
win10-20230703-en
General
-
Target
e5fd0cd5236b8a14e957049d52e422ac1da98077c8f37141cd1a8d0e3938d1b9
-
Size
730KB
-
MD5
40fbeddad5a68665f9cf789dc4658f1a
-
SHA1
108b9222d937423a1ae83ff87f7a88817b97867e
-
SHA256
e5fd0cd5236b8a14e957049d52e422ac1da98077c8f37141cd1a8d0e3938d1b9
-
SHA512
05fa41932b4fcc5f9bf3231490c86c8266dd941c50561fcb6290de2dfb405ccbcbc330f4320a89cef079d93e967f50803fd197ea9cd42d3590c28743aa96b0db
-
SSDEEP
12288:Cl2P4G+a9A35KMRvZLgVALw2/qoBqcoUhpF:ClQJZ9SZLlLdioBqcNp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5fd0cd5236b8a14e957049d52e422ac1da98077c8f37141cd1a8d0e3938d1b9
Files
-
e5fd0cd5236b8a14e957049d52e422ac1da98077c8f37141cd1a8d0e3938d1b9.exe windows x64
108e18be559cec71db1f519ae1ab24ab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
inet_pton
WSAStartup
closesocket
socket
connect
recv
send
htons
WSACleanup
crypt32
CryptUnprotectData
wininet
InternetQueryDataAvailable
HttpQueryInfoW
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetOpenA
kernel32
MultiByteToWideChar
LocalFree
WideCharToMultiByte
IsDebuggerPresent
WriteProcessMemory
TerminateProcess
GetModuleFileNameW
WaitForSingleObject
ResumeThread
CloseHandle
GetThreadContext
VirtualAllocEx
CreateProcessW
SetThreadContext
GetExitCodeProcess
ExitProcess
GetModuleFileNameA
GetVolumeInformationW
GetGeoInfoA
HeapFree
EnterCriticalSection
GetProductInfo
LeaveCriticalSection
InitializeCriticalSectionEx
HeapSize
GetLogicalDriveStringsW
GetTimeZoneInformation
GetLastError
HeapReAlloc
GetNativeSystemInfo
HeapAlloc
GetUserGeoID
DecodePointer
GetProcAddress
DeleteCriticalSection
GetComputerNameW
GetProcessHeap
GlobalMemoryStatusEx
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetStartupInfoW
RaiseException
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
ReadFile
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
SetStdHandle
CreateFileW
WriteConsoleW
OutputDebugStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEvent
ResetEvent
SetEndOfFile
CreateEventW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlUnwind
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
GetCommandLineW
GetCurrentThreadId
WaitForSingleObjectEx
LCMapStringEx
GetExitCodeThread
GetFileInformationByHandleEx
AreFileApisANSI
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
user32
EnumDisplayDevicesW
GetDesktopWindow
GetDC
ReleaseDC
GetWindowRect
GetSystemMetrics
gdi32
SelectObject
CreateCompatibleBitmap
BitBlt
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
RegEnumKeyExA
GetCurrentHwProfileW
shell32
SHGetKnownFolderPath
ShellExecuteA
ole32
CreateStreamOnHGlobal
CoTaskMemFree
shlwapi
ord214
ord213
ord184
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromScan0
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
Sections
.text Size: 571KB - Virtual size: 570KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ