Static task
static1
Behavioral task
behavioral1
Sample
2e5338c7dd9bf361c67babd5004a2216fef032ea1886a43a3cdd1fa8cce085de.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2e5338c7dd9bf361c67babd5004a2216fef032ea1886a43a3cdd1fa8cce085de.exe
Resource
win10v2004-20230915-en
General
-
Target
2e5338c7dd9bf361c67babd5004a2216fef032ea1886a43a3cdd1fa8cce085de
-
Size
108KB
-
MD5
f45503e0e1f1e78687fb743bc2565d66
-
SHA1
9ffcdc0e42b55775ee5c4963fd2b1f67a5e60db5
-
SHA256
2e5338c7dd9bf361c67babd5004a2216fef032ea1886a43a3cdd1fa8cce085de
-
SHA512
87c5eb09279948eb501abc4f9a4714b7ebefcb0b5818cd510d5696871000cf85e8a349c2b44eda903c8021ac4709d7cd86ef0e87e033d7eb423ee4df6f701bf2
-
SSDEEP
1536:14EmY32eDgrKgXJkDX8xaMFCvJgZP1ar:1v20+7fxaEPgr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e5338c7dd9bf361c67babd5004a2216fef032ea1886a43a3cdd1fa8cce085de
Files
-
2e5338c7dd9bf361c67babd5004a2216fef032ea1886a43a3cdd1fa8cce085de.exe windows:4 windows x86
ded1064d21dd8d346595da7a68107507
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord757
ord604
ord6326
ord764
ord578
ord2020
ord876
ord2322
ord310
ord5975
ord1054
ord3830
ord3602
ord3633
ord3640
ord3641
ord3440
ord5182
ord4212
ord4735
ord4890
ord4580
ord1671
ord1670
ord1551
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord354
ord605
ord3719
ord6151
ord297
ord5491
ord304
ord1917
ord762
ord781
ord1084
ord2371
ord1903
ord1063
ord1203
ord2638
ord1984
ord3900
ord2818
ord3704
ord3712
ord5392
ord988
ord1393
ord2266
ord6161
ord2729
ord2680
ord3064
ord5515
ord4500
ord4367
ord2148
ord6257
ord3791
ord6087
ord2799
ord4363
ord4670
ord4199
ord1364
ord1618
ord2715
ord784
ord2141
ord350
ord3934
ord4035
ord5825
ord2815
ord4579
ord6333
ord6330
ord6531
ord6608
ord6680
ord6642
ord6497
ord6335
ord6589
ord6616
ord6356
ord6394
ord6492
ord6487
ord6614
ord6320
ord6391
ord6324
ord6442
ord6612
ord6389
ord630
ord795
ord6379
ord2902
ord2747
ord2021
ord385
ord6533
ord6168
ord785
ord2323
ord1248
ord1247
ord6606
ord6607
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord6315
ord4541
ord1207
msvcr71
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_onexit
__p__commode
__security_error_handler
?terminate@@YAXXZ
memset
_except_handler3
free
_CxxThrowException
__CxxFrameHandler
??1exception@@UAE@XZ
_controlfp
_setmbcp
__p__fmode
__set_app_type
__dllonexit
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
kernel32
GetCurrentDirectoryA
GetVersionExA
CloseHandle
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
LoadIconA
EnableWindow
GetSystemMenu
AppendMenuA
SendMessageA
comctl32
ord17
oleaut32
VariantInit
VariantCopy
VariantClear
VariantTimeToSystemTime
msvcp71
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
|� Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE