Static task
static1
Behavioral task
behavioral1
Sample
e54a1ae8eac992f35f5d623e7198d840f67f836ad049abaaa81046c009912121.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e54a1ae8eac992f35f5d623e7198d840f67f836ad049abaaa81046c009912121.exe
Resource
win10v2004-20230915-en
General
-
Target
e54a1ae8eac992f35f5d623e7198d840f67f836ad049abaaa81046c009912121
-
Size
287KB
-
MD5
eb9597f4c0ecccd08ecb55618d045520
-
SHA1
ea83199216752d89b15e9a81cf2944b882d0afaa
-
SHA256
e54a1ae8eac992f35f5d623e7198d840f67f836ad049abaaa81046c009912121
-
SHA512
19ed4b6e9b346de37ab4703452ce617f642c13da9d09ca8e63a58304bb9cfb1933d6d542c30cba4fd06705186da24b6b2de016b950d882a4ccbf8acdc5d1d62a
-
SSDEEP
3072:5I2cH/tkk8gdv730s4sT1NvO2Bw7Fw/MqisBI5+S9YU0d71bnQvSl2RyW:5I5ND0ykFw/Mq4RYU0d7M89W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e54a1ae8eac992f35f5d623e7198d840f67f836ad049abaaa81046c009912121
Files
-
e54a1ae8eac992f35f5d623e7198d840f67f836ad049abaaa81046c009912121.exe windows:4 windows x64
dd267c0d90d76811b5c7f7a1c1474162
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetTokenInformation
kernel32
AllocConsole
CloseHandle
CreateDirectoryA
CreateSemaphoreW
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
FindClose
FindFirstFileA
FormatMessageA
FreeLibrary
GetACP
GetConsoleCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemDefaultLCID
GetThreadLocale
GetUserDefaultLCID
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
MultiByteToWideChar
RaiseException
ReleaseSemaphore
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetConsoleCP
SetConsoleOutputCP
SetCurrentDirectoryA
SetDllDirectoryA
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_fullpath
_initterm
_lock
_onexit
_snprintf
_unlock
abort
calloc
exit
fclose
ferror
fgets
fopen
fprintf
fputc
fputs
free
fwrite
getenv
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
realloc
signal
strchr
strcmp
strcpy
strerror
strlen
strncat
strncmp
strncpy
strrchr
strtoul
vfprintf
wcslen
_write
_read
_itoa
_close
shell32
SHGetFolderPathA
user32
MessageBoxA
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ