Static task
static1
Behavioral task
behavioral1
Sample
e3a5578f2706697f694f7d2d38c51bd11642a86a4bbfaa678dc52c62addffaf0.exe
Resource
win7-20230831-en
General
-
Target
e3a5578f2706697f694f7d2d38c51bd11642a86a4bbfaa678dc52c62addffaf0
-
Size
468KB
-
MD5
f0981eb4056e521ab9e24368b77912df
-
SHA1
04ba40b320461f0b9ac703fa4da3bb01822326a2
-
SHA256
e3a5578f2706697f694f7d2d38c51bd11642a86a4bbfaa678dc52c62addffaf0
-
SHA512
6ab2c8a9f878bc1554b5ec8dbab7253a50c8536d04ecc0771f0f219c99a82c20484d849dea279567271767c5945d9134c7db528ecb9a94ae9e06e5523840d321
-
SSDEEP
12288:zBVN4UPAYNj9hiKEzh0dljiZNMJCpqw16g3r:zBVN4/YNj9hiz2Tu7Mgpqwgkr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3a5578f2706697f694f7d2d38c51bd11642a86a4bbfaa678dc52c62addffaf0
Files
-
e3a5578f2706697f694f7d2d38c51bd11642a86a4bbfaa678dc52c62addffaf0.exe windows:5 windows x86
1278ac8aa364e9d4e87aaa3f1324c3e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
GetModuleInformation
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
SetErrorMode
GetProcAddress
InitializeCriticalSection
WriteProcessMemory
SetUnhandledExceptionFilter
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SuspendThread
EnterCriticalSection
CreateEventW
DuplicateHandle
SearchPathW
CreateProcessW
WaitForMultipleObjects
TerminateProcess
ReadProcessMemory
VirtualAllocEx
GetVersionExW
GetSystemDefaultLangID
GetSystemInfo
CreateThread
TerminateThread
GetSystemTimeAsFileTime
InterlockedCompareExchange
MultiByteToWideChar
DeviceIoControl
GetLastError
GetSystemDirectoryW
LoadLibraryW
FreeLibrary
GetFileSize
ReadFile
WaitForSingleObject
CopyFileW
FindFirstFileW
FindClose
WideCharToMultiByte
LocalFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleExW
CreateProcessA
ResumeThread
GetThreadContext
SetThreadContext
GetCurrentThread
GetModuleFileNameW
VirtualAlloc
VirtualProtect
SetLastError
GetModuleHandleA
GetPrivateProfileIntA
SetFilePointer
GetTickCount
GlobalFindAtomW
GlobalAddAtomW
GetExitCodeThread
GetPrivateProfileStringW
Process32FirstW
Process32NextW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
OpenEventW
SetEvent
LoadLibraryExW
RaiseException
DecodePointer
MoveFileExW
FindNextFileW
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
DisconnectNamedPipe
GetLocalTime
GetFileAttributesW
FindFirstFileA
GetPrivateProfileStringA
GetModuleFileNameA
FindNextFileA
SetHandleInformation
CreatePipe
CreateDirectoryW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
CloseHandle
Sleep
WriteFile
CreateFileW
SetFileAttributesW
DeleteFileW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
SetStdHandle
SetEndOfFile
FlushFileBuffers
WriteConsoleW
FlushInstructionCache
SetEnvironmentVariableA
RtlUnwind
GetCommandLineW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeW
FindFirstFileExW
IsProcessorFeaturePresent
GetStringTypeW
EncodePointer
OutputDebugStringW
IsDebuggerPresent
ExitProcess
QueryPerformanceCounter
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetTimeZoneInformation
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
EnumSystemLocalesW
user32
KillTimer
PostQuitMessage
TranslateMessage
SetTimer
PostThreadMessageW
GetMessageW
PeekMessageW
IsWindow
FindWindowW
SendMessageTimeoutW
advapi32
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
FreeSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegQueryInfoKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueA
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFolderPathA
ole32
CoInitialize
CoCreateGuid
CoUninitialize
shlwapi
PathFileExistsW
PathFindFileNameW
PathFileExistsA
wnsprintfA
wnsprintfW
SHGetValueA
wininet
HttpSendRequestA
HttpOpenRequestW
InternetConnectW
InternetSetOptionW
InternetOpenA
InternetCloseHandle
ws2_32
htonl
htons
netapi32
Netbios
NetWkstaTransportEnum
NetApiBufferFree
urlmon
URLDownloadToFileW
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE