Static task
static1
Behavioral task
behavioral1
Sample
e1e053bd3e2d4927163e4ad23b364822.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e1e053bd3e2d4927163e4ad23b364822.exe
Resource
win10v2004-20230703-en
General
-
Target
e1e053bd3e2d4927163e4ad23b364822
-
Size
19KB
-
MD5
e1e053bd3e2d4927163e4ad23b364822
-
SHA1
e2af17403a4814165d8bd0e22e967aba0df86b7c
-
SHA256
eaf3f87ffd9ff2cec1e0ed6c947e4e39d8e7fd8ddb9f9591fb1bdf70dad5f844
-
SHA512
1bf0052d6e81d086f6f0b5509825dcc4848b2a47eff4fc67e8e7e8cf19289b21e66e91ce7b0983a0298307998aa1bcebf41209a74f9ca7ca38b14c2614879391
-
SSDEEP
384:ijSKlSVmRvX8aOBUUmzaR314G3YyLf8zXqbvB3VmdinSpqIm5mX:irXvX8aOMaR3uITUzatl/5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1e053bd3e2d4927163e4ad23b364822
Files
-
e1e053bd3e2d4927163e4ad23b364822.exe windows x86
8126e9867c181944ac88134ff46d169b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
GetLogicalDriveStringsW
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
CloseHandle
HeapAlloc
HeapReAlloc
HeapFree
GetFileSizeEx
Sleep
ExitProcess
CreateThread
WaitForMultipleObjects
lstrcmpW
lstrcpyW
lstrcatW
lstrlenW
GetDriveTypeW
GetFileAttributesW
FindNextFileW
FindFirstFileExW
FindClose
DeleteFileW
CreateFileW
GetProcessHeap
GetCommandLineW
crypt32
CryptDecodeObjectEx
advapi32
CryptImportKey
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
CryptDecrypt
user32
MessageBoxW
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ