Static task
static1
Behavioral task
behavioral1
Sample
e2cf35139debd89e36d34cb559115ae0f652ae13d1417874993a5c9662a10206.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e2cf35139debd89e36d34cb559115ae0f652ae13d1417874993a5c9662a10206.exe
Resource
win10v2004-20230915-en
General
-
Target
e2cf35139debd89e36d34cb559115ae0f652ae13d1417874993a5c9662a10206
-
Size
228KB
-
MD5
75b8ef73468d68d1dba6bf30c414221c
-
SHA1
dbacdfc2f5333dd1d4d4814ac1983f1185afe898
-
SHA256
e2cf35139debd89e36d34cb559115ae0f652ae13d1417874993a5c9662a10206
-
SHA512
534f8b89ac00d4f5f598d8a4e0669c37dcb5a24d0341c3a565879b86f66d58aac2b9c3ebb2bda8e3aafb1a62d376414efff1e12c31287c2a48791d3756f3db5c
-
SSDEEP
3072:/faV6VNBYYFlB2KuIE7oz2z6wSb43rknmLr1i1JGZs49koDvjvGPhNjlPu:XvBgkcXGQOJVIvz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2cf35139debd89e36d34cb559115ae0f652ae13d1417874993a5c9662a10206
Files
-
e2cf35139debd89e36d34cb559115ae0f652ae13d1417874993a5c9662a10206.exe windows:4 windows x86
ce1ae64d1c6fcf9beecea47dd491ec79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
SetLastError
InterlockedDecrement
FindClose
FindFirstFileA
lstrcmpiA
GetVersionExA
GetLastError
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
CompareStringA
FlushInstructionCache
GetModuleHandleA
WideCharToMultiByte
lstrlenW
TerminateThread
WaitForSingleObject
CreateThread
DuplicateHandle
GetCurrentProcessId
CreateDirectoryA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
FreeResource
WriteFile
SizeofResource
LockResource
WritePrivateProfileStringA
Process32Next
Module32Next
GetFileAttributesExA
Module32First
Process32First
CreateToolhelp32Snapshot
LoadResource
FindResourceA
LoadLibraryW
LocalFree
LocalAlloc
CreateFileW
MultiByteToWideChar
lstrlenA
GetTempPathA
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
HeapSize
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetOEMCP
GetACP
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
GetVersion
RaiseException
GetCommandLineA
GetStartupInfoA
HeapReAlloc
InterlockedIncrement
ExitProcess
GetTempFileNameA
MoveFileExA
SearchPathA
TerminateProcess
LoadLibraryA
GetProcAddress
HeapFree
HeapAlloc
OpenProcess
FreeLibrary
CreateFileA
SetFilePointer
ReadFile
GetSystemDirectoryA
GetStringTypeW
SetFileAttributesA
GetCurrentProcess
CloseHandle
user32
SetWindowPos
ScreenToClient
SetCursor
EndDialog
GetParent
GetDlgCtrlID
FillRect
DrawFocusRect
GetFocus
GetSysColor
IsWindowEnabled
CallWindowProcA
GetCursorPos
MapWindowPoints
GetClientRect
SystemParametersInfoA
GetWindowRect
GetWindow
GetWindowLongA
SendMessageA
IsDialogMessageA
EndPaint
BeginPaint
CreateDialogParamA
PtInRect
SetFocus
GetCapture
ReleaseCapture
InvalidateRect
UpdateWindow
DestroyCursor
SetRectEmpty
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
CharNextA
SetWindowTextA
CreateWindowExA
ReleaseDC
GetDC
DrawTextA
OffsetRect
GetClassNameA
SetWindowLongA
CreateCursor
GetWindowTextA
GetWindowTextLengthA
IsWindow
DestroyWindow
PostQuitMessage
MessageBoxA
ShowWindow
GetActiveWindow
DialogBoxParamA
GetSystemMetrics
LoadImageA
GetDlgItem
EnableWindow
SetCapture
gdi32
SelectObject
DeleteObject
GetObjectA
CreateFontIndirectA
SetTextColor
GetStockObject
DeleteDC
SetBkMode
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
LsaNtStatusToWinError
LookupPrivilegeValueA
shell32
ShellExecuteA
ole32
CoUninitialize
CoInitialize
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
SHDeleteKeyA
PathCombineA
PathAppendA
PathFileExistsA
SHGetValueA
SHSetValueA
StrStrIA
SHDeleteValueA
ntdll
ZwQuerySystemInformation
RtlUnwind
ZwQueryInformationFile
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE