Static task
static1
Behavioral task
behavioral1
Sample
e5997a14cc8f48d7f791fbaaf1c1f64f99812ccc41025aa91c3c749ddb00840b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e5997a14cc8f48d7f791fbaaf1c1f64f99812ccc41025aa91c3c749ddb00840b.exe
Resource
win10v2004-20230703-en
General
-
Target
e5997a14cc8f48d7f791fbaaf1c1f64f99812ccc41025aa91c3c749ddb00840b
-
Size
1.7MB
-
MD5
d90be6a051556160f4a0a9acd0bcc7b8
-
SHA1
0212effad26f72ffdaf27441cf90377e760b0859
-
SHA256
e5997a14cc8f48d7f791fbaaf1c1f64f99812ccc41025aa91c3c749ddb00840b
-
SHA512
dba85c9c19819354bcfae607bd902bfd6c2c04c5bd35ef35323429239c2202265daccb41b5ad779a938d832b6db6da8706a8a94f1fa9f5ac5d58384781c78416
-
SSDEEP
24576:W7Ya8Gj4HB++ZY3EznR2TC3TwCeXsbgoi3owhVM9:dfGEh++XLx33e8bgoyi9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5997a14cc8f48d7f791fbaaf1c1f64f99812ccc41025aa91c3c749ddb00840b
Files
-
e5997a14cc8f48d7f791fbaaf1c1f64f99812ccc41025aa91c3c749ddb00840b.exe windows x86
bf711d7589d4acb46a29244846716476
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
CloseHandle
RaiseException
DecodePointer
SetLastError
DebugBreak
Sleep
IsDebuggerPresent
EnterCriticalSection
GetCurrentProcess
LeaveCriticalSection
GetVersionExW
LocalFree
FormatMessageW
InitializeCriticalSectionEx
GetLastError
DeleteCriticalSection
WideCharToMultiByte
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SetErrorMode
SizeofResource
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
InitializeCriticalSectionAndSpinCount
FreeLibrary
GetModuleFileNameW
GetModuleHandleExW
GetProcAddress
LoadLibraryW
FileTimeToSystemTime
MultiByteToWideChar
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
FindClose
FindNextFileW
GetFileAttributesW
GetTempPathW
GetSystemDirectoryW
lstrcmpW
TerminateProcess
ExpandEnvironmentStringsW
LocalAlloc
VerSetConditionMask
CompareFileTime
GetFullPathNameW
OutputDebugStringW
GetModuleHandleW
LoadLibraryExW
lstrcmpA
VerifyVersionInfoW
GetSystemInfo
FormatMessageA
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
ExitProcess
GetStdHandle
WriteFile
GetACP
GetFileType
LCMapStringW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
user32
MessageBoxW
advapi32
OpenProcessToken
GetTokenInformation
RegOpenCurrentUser
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
LsaNtStatusToWinError
ole32
CoInitializeEx
CoUninitialize
CoInitializeSecurity
oleaut32
SafeArrayCreate
SafeArrayGetVartype
SafeArrayCopy
SafeArrayUnlock
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
VariantChangeType
VariantClear
VariantInit
SafeArrayDestroy
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
Sections
.text Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE