Static task
static1
Behavioral task
behavioral1
Sample
e4e641c8b39befc03c644d385f71d2ccccdfda9b92d2346f9c8586139e7199e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e4e641c8b39befc03c644d385f71d2ccccdfda9b92d2346f9c8586139e7199e5.exe
Resource
win10v2004-20231215-en
General
-
Target
e4e641c8b39befc03c644d385f71d2ccccdfda9b92d2346f9c8586139e7199e5
-
Size
296KB
-
MD5
c17450ee458100d7e189be3df6639979
-
SHA1
b6c0577e323c15c1ba3f124a34fe797b76f5aab9
-
SHA256
e4e641c8b39befc03c644d385f71d2ccccdfda9b92d2346f9c8586139e7199e5
-
SHA512
5368db3d8b8e211b5fd22eb59ad34ddfedfc13def6571d80dc63c8b8c93f2e86d30289442b98beedb82e7830d5e89beba34c9db241934ada475c68af61fb6fdd
-
SSDEEP
3072:+RFZ7ut1P5rxzYIsOCO7NSH3XJRd5/DEcPKzmycCrYPS6BA:UFJc1P5rxzW67knvgYoRrrH6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4e641c8b39befc03c644d385f71d2ccccdfda9b92d2346f9c8586139e7199e5
Files
-
e4e641c8b39befc03c644d385f71d2ccccdfda9b92d2346f9c8586139e7199e5.exe windows x86
4a60f94d678887610d46dafb1219713a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetFileSize
GetConsoleAliasExesA
GetDriveTypeW
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetUserDefaultLCID
SetComputerNameW
GetComputerNameW
FlushConsoleInputBuffer
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetConsoleAliasesLengthA
GetNumberFormatA
GetWindowsDirectoryA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
_hread
GetPrivateProfileStructW
GetCalendarInfoW
SetConsoleCP
DeleteVolumeMountPointW
TransactNamedPipe
GetTimeFormatW
ExitThread
CreateMailslotW
EnumSystemLocalesA
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
BackupWrite
MoveFileW
GlobalFree
LoadLibraryA
OpenWaitableTimerW
SetConsoleCtrlHandler
GlobalGetAtomNameW
FindNextFileA
CreateIoCompletionPort
_lread
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
GetCurrentDirectoryA
EnumDateFormatsW
GetConsoleCursorInfo
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
TerminateJobObject
LocalSize
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
ReadConsoleOutputCharacterW
DeleteFileA
CloseHandle
ReadFile
WriteConsoleW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
ExitProcess
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ