Static task
static1
Behavioral task
behavioral1
Sample
e53fe49ecc5d166998120a66a8ad6887e7b5c8e901fec317d29c21797971208f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e53fe49ecc5d166998120a66a8ad6887e7b5c8e901fec317d29c21797971208f.exe
Resource
win10v2004-20230915-en
General
-
Target
e53fe49ecc5d166998120a66a8ad6887e7b5c8e901fec317d29c21797971208f
-
Size
527KB
-
MD5
185ffa61bc5fcf895a77519cd6d6660e
-
SHA1
f6fd24563544f1980331a2bfb5d7915d9392ea5c
-
SHA256
e53fe49ecc5d166998120a66a8ad6887e7b5c8e901fec317d29c21797971208f
-
SHA512
36df7953e8773cc48e9a06df151b52042acfc8414bf9f7a40ed41af6833871238768ecbfc93dae91b7b54a01e19eb69da404e5bb714a96fbdb0ff8a84a14db94
-
SSDEEP
12288:1bt0JYm+qJiDF1VS+at8Yc8TCk+ZgPlsyqC2N:15V9qJiDF6T8GTCkayqC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e53fe49ecc5d166998120a66a8ad6887e7b5c8e901fec317d29c21797971208f
Files
-
e53fe49ecc5d166998120a66a8ad6887e7b5c8e901fec317d29c21797971208f.exe windows:4 windows x86
9e4758d3d6497c0f00dcef75b02b964f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
LocalFree
LocalAlloc
GetLastError
MultiByteToWideChar
GetCurrentProcess
SetFileAttributesA
CopyFileA
CreateDirectoryA
GetTempPathA
ResumeThread
SetPriorityClass
GetCurrentThread
SetThreadPriority
WriteFile
lstrlenA
lstrcpyA
GetWindowsDirectoryA
ReleaseMutex
GetExitCodeProcess
WaitForSingleObject
WideCharToMultiByte
CreateMutexA
RtlUnwind
GetFileAttributesA
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
GetFullPathNameA
HeapReAlloc
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
FindNextFileA
GetModuleHandleA
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateProcessA
OpenProcess
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
SetFilePointer
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
FindClose
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetLocaleInfoW
CreateFileA
GetFileSize
ReadFile
CloseHandle
lstrcmpiA
GetModuleFileNameA
GetDriveTypeA
GetShortPathNameA
IsDBCSLeadByte
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
GetSystemDefaultLangID
MulDiv
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GetVolumeInformationA
GetVersionExA
GetSystemDirectoryA
GetTempFileNameA
DeleteFileA
GetPrivateProfileIntA
Sleep
FormatMessageA
SetErrorMode
FindFirstFileA
HeapDestroy
TlsAlloc
GetLocaleInfoA
user32
GetWindowLongA
GetWindowThreadProcessId
TranslateMessage
PeekMessageA
CallWindowProcA
FindWindowA
SetClassLongA
LoadIconA
ExitWindowsEx
wsprintfA
GetWindowTextLengthA
SetCursor
LoadCursorA
BeginPaint
EndPaint
GetKeyboardType
EndDialog
GetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
GetWindow
IsWindowVisible
IsWindowEnabled
GetActiveWindow
SetWindowPos
GetClientRect
SetFocus
SetTimer
GetMessageA
DispatchMessageA
KillTimer
InvalidateRect
OffsetRect
GetSysColor
CharNextA
SetWindowLongA
SendMessageA
GetDlgItem
EnableWindow
BringWindowToTop
CharPrevA
GetParent
PostMessageA
SetWindowTextA
LoadStringA
MessageBoxA
GetSystemMetrics
FlashWindow
GetWindowRect
ScreenToClient
UpdateWindow
wvsprintfA
GetDC
ShowWindow
ReleaseDC
gdi32
SetBkColor
SetTextColor
GetTextExtentPoint32A
RestoreDC
BitBlt
SelectObject
SaveDC
DeleteDC
SetBkMode
CreateCompatibleBitmap
CreateDIBitmap
CreateCompatibleDC
StretchDIBits
SetBrushOrgEx
UnrealizeObject
SetStretchBltMode
RealizePalette
SelectPalette
CreateFontIndirectA
GetDeviceCaps
CreatePalette
ExtTextOutA
DeleteObject
advapi32
RegOpenKeyExA
CloseServiceHandle
AdjustTokenPrivileges
RegCreateKeyExA
RegFlushKey
OpenProcessToken
RegCloseKey
RegSetValueExA
LookupPrivilegeValueA
OpenSCManagerA
RegQueryValueExA
RegEnumValueA
RegDeleteValueA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
mpr
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 378KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE