_LoadEnvironment@0
Static task
static1
Behavioral task
behavioral1
Sample
e171ff09c0e021ade14990204fa3e3c56a6b7447ce2e7239d04a36be4af82339.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e171ff09c0e021ade14990204fa3e3c56a6b7447ce2e7239d04a36be4af82339.exe
Resource
win10v2004-20230915-en
General
-
Target
e171ff09c0e021ade14990204fa3e3c56a6b7447ce2e7239d04a36be4af82339
-
Size
109KB
-
MD5
030234b79a755ac060662fae7759918a
-
SHA1
f8d3126508155d76573a7d77883fa33f14699bd6
-
SHA256
d30bb1101bcdd01eed76a8573f30e73f9c5c5f72a3b1f3034515fd949416fefa
-
SHA512
8b650317699f65ba6a7f168fff59e6d26128c594fbe491b08012da160b981357952abfa7bdc75de759e666e56ede0d7892bfe4e3540af5f74a06fcd5d3244c5c
-
SSDEEP
3072:yEqz/5Pd9ucK9kmM71TMGK6LTUW/q+EqtGabcL/aBp:3Sd4fMBMGLTH/BEqRbGaD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e171ff09c0e021ade14990204fa3e3c56a6b7447ce2e7239d04a36be4af82339
Files
-
e171ff09c0e021ade14990204fa3e3c56a6b7447ce2e7239d04a36be4af82339.zip
-
e171ff09c0e021ade14990204fa3e3c56a6b7447ce2e7239d04a36be4af82339.exe windows:6 windows x86
f206bf4934412e0139dfd76edfc7dab0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClipCursor
ole32
CoGetApartmentType
CoGetObjectContext
advapi32
RegDisablePredefinedCacheEx
RegCloseKey
DeleteAce
kernel32
CreateFileW
WriteConsoleW
ResetEvent
FreeConsole
RaiseException
CloseHandle
WaitForSingleObjectEx
GetCurrentThreadId
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
DecodePointer
CreateEventW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
InitializeSListHead
HeapReAlloc
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
Exports
Exports
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ