Static task
static1
Behavioral task
behavioral1
Sample
eed0242b21418226176877d01696b296ddf0f1bdb4b9661222d244671f0d2d22.exe
Resource
win10-20230915-en
General
-
Target
eed0242b21418226176877d01696b296ddf0f1bdb4b9661222d244671f0d2d22
-
Size
736KB
-
MD5
088d016f9807c0b5ec23015b1381a0d8
-
SHA1
f83bc304dc3013da258a3f6825ca30e017ea9b60
-
SHA256
eed0242b21418226176877d01696b296ddf0f1bdb4b9661222d244671f0d2d22
-
SHA512
9812539e7446234eaad56b0d9201a161f81e68cc3cf994e9b89a3e0aedaae43800d8902b2e9ba958a5060c7b9f589841544debffb8bcf862ba94dd38104c3bc1
-
SSDEEP
12288:5ZmIzA2tFCFDwOWG+1efrMSXHx0s3uGCLA2QcqwKHq66VAWn/WlJ23rlx:5vznFlw7HR+x/qwTWAOwlx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eed0242b21418226176877d01696b296ddf0f1bdb4b9661222d244671f0d2d22
Files
-
eed0242b21418226176877d01696b296ddf0f1bdb4b9661222d244671f0d2d22.exe windows:5 windows x86
de327b03321c28ef8e77881c2e5f61b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
FillConsoleOutputCharacterA
EnumResourceNamesW
SetVolumeLabelA
EndUpdateResourceW
GetConsoleAliasA
WritePrivateProfileSectionA
GetSystemWindowsDirectoryW
InterlockedCompareExchange
SetComputerNameW
AddConsoleAliasW
SetVolumeMountPointW
_lclose
MoveFileWithProgressA
GetTickCount
GetNumberFormatA
CreateActCtxW
TzSpecificLocalTimeToSystemTime
SetProcessPriorityBoost
GetVolumeInformationA
GlobalFindAtomA
LoadLibraryW
TerminateThread
ReadConsoleInputA
SizeofResource
GetFileAttributesA
TransactNamedPipe
FindNextVolumeW
CreateSemaphoreA
FileTimeToSystemTime
GetCompressedFileSizeA
GetACP
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
PeekConsoleInputW
RemoveDirectoryA
EnumSystemCodePagesW
_hwrite
InterlockedExchangeAdd
LocalAlloc
GetFileType
CreateHardLinkW
AddAtomW
BeginUpdateResourceA
GetCommMask
FoldStringW
FindNextFileA
FreeEnvironmentStringsW
VirtualProtect
TerminateJobObject
GetWindowsDirectoryW
GetCurrentProcessId
OpenFileMappingA
LocalFree
GetProcessHeap
SetEndOfFile
CreateFileA
CloseHandle
SetStdHandle
WriteConsoleW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetModuleHandleW
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ReadFile
GetOEMCP
IsValidCodePage
SetHandleCount
GetStdHandle
GetStartupInfoA
SetFilePointer
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetModuleHandleA
WriteConsoleA
GetConsoleOutputCP
user32
GetWindowTextLengthW
LoadBitmapA
LoadMenuA
CharUpperBuffA
LoadMenuW
SetMenu
CharToOemBuffW
ChangeDisplaySettingsA
GetMessagePos
Sections
.text Size: 663KB - Virtual size: 663KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ