Static task
static1
Behavioral task
behavioral1
Sample
e21918f67090f4b1943956fca584f980fca3c3492fa5e6c3455a2666f7684d93.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e21918f67090f4b1943956fca584f980fca3c3492fa5e6c3455a2666f7684d93.exe
Resource
win10v2004-20230915-en
General
-
Target
e21918f67090f4b1943956fca584f980fca3c3492fa5e6c3455a2666f7684d93
-
Size
97KB
-
MD5
de3aad60331c56d3f6db128041000623
-
SHA1
dc2afb5db4fd0d0154da03e32bb90852bb522348
-
SHA256
e21918f67090f4b1943956fca584f980fca3c3492fa5e6c3455a2666f7684d93
-
SHA512
6f5282e3aa9d02b2b3ed815c2e409ff971754afee54771fdf84c510f4aad5565d93d1783a2bffdb525f1fb7421da0b84bf147f9c2a7cba152e1c8522613e2989
-
SSDEEP
1536:iLl9a7V+nM7EB9gt12ilspadprjxN2KrVT0b9pJDRkg:i71ct12iOcHHVC9PDR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e21918f67090f4b1943956fca584f980fca3c3492fa5e6c3455a2666f7684d93
Files
-
e21918f67090f4b1943956fca584f980fca3c3492fa5e6c3455a2666f7684d93.exe windows:6 windows x64
153cb797f552c2c5fd66c55ec61394e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WaitForSingleObject
CreateFileW
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetTickCount64
Process32NextW
LoadLibraryA
DeleteFileW
Process32FirstW
CloseHandle
GetProcAddress
GetCurrentProcessId
QueryFullProcessImageNameW
EncodePointer
RtlUnwindEx
GetModuleHandleExW
FreeLibrary
ExitProcess
VirtualQuery
CreateThread
WriteFile
TerminateProcess
GetCurrentProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WideCharToMultiByte
GetFileInformationByHandleEx
GetModuleHandleW
GetLastError
AreFileApisANSI
GetTempPathW
SetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileExW
FindFirstFileW
FindClose
CreateDirectoryW
RaiseException
GetLocaleInfoEx
FormatMessageA
LocalFree
user32
GetClassNameA
EnumChildWindows
FindWindowExA
EnumWindows
SendMessageA
shell32
ShellExecuteA
msvcrt
__argv
__argc
__set_app_type
_XcptFilter
_msize
_environ
__getmainargs
?terminate@@YAXXZ
fread
strcpy_s
_set_fmode
_initterm_e
_initterm
_callnewh
rand_s
malloc
free
___lc_codepage_func
fseek
fclose
_wfopen_s
_wcsicmp
ftell
_amsg_exit
memset
__C_specific_handler
_CxxThrowException
?_set_new_mode@@YAHH@Z
abort
realloc
_errno
__CxxFrameHandler3
memchr
memcmp
memcpy
memmove
__DestructExceptionObject
_local_unwind
_commode
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ