Static task
static1
Behavioral task
behavioral1
Sample
ea1afff377fbf7298eb11174b83463787eb131e546de41a31df5f3b2b90f4c34.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ea1afff377fbf7298eb11174b83463787eb131e546de41a31df5f3b2b90f4c34.exe
Resource
win10v2004-20230915-en
General
-
Target
ea1afff377fbf7298eb11174b83463787eb131e546de41a31df5f3b2b90f4c34
-
Size
2.6MB
-
MD5
8ecec1900ff48ece6f7d1fd816f55c60
-
SHA1
5e75f3e6fe9cd3c5988f6c8548054e0f62629f80
-
SHA256
ea1afff377fbf7298eb11174b83463787eb131e546de41a31df5f3b2b90f4c34
-
SHA512
efa82c9d1ef480890561aba22d2fae40b34573e4f317b2a4c1b2563ce85053921fd84c23bc67a032b655592b027be7252e594512b1a3d9a61ffc7b6fbdad3022
-
SSDEEP
49152:dBaVHfj5fCPd2awty0W7U9spPGUbw1rofa78rOvxO826ilRBr:do5fj5qwkdlp9Oofa4rOvp2llRBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea1afff377fbf7298eb11174b83463787eb131e546de41a31df5f3b2b90f4c34
Files
-
ea1afff377fbf7298eb11174b83463787eb131e546de41a31df5f3b2b90f4c34.exe windows:6 windows x86
7ffd357d1a473b2336868ec0c8533f5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DecodePointer
GetSystemInfo
lstrcatW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileW
LocalFree
SetFileAttributesW
lstrcpyW
CreateMutexW
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
Sleep
ReadFile
WritePrivateProfileStringW
FindClose
CreateFileMappingW
FindNextFileW
ReleaseMutex
GetDriveTypeW
FlushInstructionCache
SetLastError
lstrcmpiA
DeviceIoControl
GlobalReAlloc
CreateThread
GlobalFree
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
lstrcmpW
GetModuleFileNameA
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
GetStartupInfoW
EnterCriticalSection
HeapSize
GetProcAddress
GetLastError
VerifyVersionInfoW
RaiseException
GlobalUnlock
lstrlenW
InitializeCriticalSectionEx
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
MulDiv
LeaveCriticalSection
HeapReAlloc
LoadLibraryW
GlobalAlloc
WriteFile
GetProcessHeap
GetModuleHandleW
GlobalLock
CreateDirectoryW
HeapFree
GetCurrentProcess
MoveFileExW
VerSetConditionMask
HeapAlloc
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
WideCharToMultiByte
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
SetNamedPipeHandleState
WaitNamedPipeW
PeekNamedPipe
QueryPerformanceCounter
user32
ReleaseDC
GetDesktopWindow
CreateWindowExW
MessageBoxW
SendMessageW
LoadImageW
DialogBoxIndirectParamW
GetDlgItem
SetWindowLongW
EndDialog
SendDlgItemMessageW
ShowWindow
GetActiveWindow
GetDlgItemTextW
SetDlgItemTextW
EnableWindow
GetDlgCtrlID
ExitWindowsEx
MapDialogRect
UnregisterClassW
wsprintfW
GetDC
gdi32
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
GetObjectW
SetTextColor
advapi32
RegOpenKeyExW
RegCreateKeyExW
AdjustTokenPrivileges
ControlService
RegDeleteTreeW
QueryServiceStatus
StartServiceW
LookupPrivilegeValueW
OpenServiceW
OpenSCManagerW
DeleteService
OpenProcessToken
CloseServiceHandle
CreateServiceW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteKeyW
RegQueryValueExW
shell32
ord75
SHGetPathFromIDListW
SHGetSpecialFolderPathW
SHFileOperationW
SHChangeNotify
SHBrowseForFolderW
ole32
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemFree
CoInitializeEx
CoUninitialize
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
PathFindFileNameW
StrStrW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ