Static task
static1
Behavioral task
behavioral1
Sample
e837d64baa4860d78de98f961b8d59bbfa54b18b84bd684357a05d6ff241e7dc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e837d64baa4860d78de98f961b8d59bbfa54b18b84bd684357a05d6ff241e7dc.exe
Resource
win10v2004-20230915-en
General
-
Target
e837d64baa4860d78de98f961b8d59bbfa54b18b84bd684357a05d6ff241e7dc
-
Size
587KB
-
MD5
139b0bdef81e287fa29e4ba132a24e2d
-
SHA1
821b77553f78e943c6c6cba7b828492efc9ff7e5
-
SHA256
e837d64baa4860d78de98f961b8d59bbfa54b18b84bd684357a05d6ff241e7dc
-
SHA512
650ecfa134bea4a08db530fee3f5f7e771b67f759ae8848cca3f31d85ec879046264ee9ef4ab2764e60b3603d9e722bc0531c9a9415d38311eb6fc7b78e324c2
-
SSDEEP
6144:wDpbBi03fgzlFPEbortC0ZXAULveKEYKSSTHut+d5Q4FJDPKr6:X03fgzlREbortC0ZXAqveKmSSbqPr6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e837d64baa4860d78de98f961b8d59bbfa54b18b84bd684357a05d6ff241e7dc
Files
-
e837d64baa4860d78de98f961b8d59bbfa54b18b84bd684357a05d6ff241e7dc.exe windows:5 windows x64
279141405971b706f6691df9d7e5ecb8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
LookupAccountSidW
OpenProcessToken
GetSecurityInfo
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
RegCreateKeyExW
RegSetValueExW
user32
LoadIconW
LoadStringW
CheckDlgButton
EnableWindow
EndDialog
GetDlgItem
IsDlgButtonChecked
MessageBoxW
GetWindowThreadProcessId
CascadeWindows
CheckMenuRadioItem
DestroyMenu
EnableMenuItem
EndTask
EnumDisplaySettingsW
EnumWindows
GetClassLongPtrW
GetClientRect
GetCursorPos
GetKeyState
GetMenu
GetMessageW
LoadBitmapW
DestroyIcon
CreateIconIndirect
TranslateMessage
TrackPopupMenuEx
ShowWindow
SetTimer
SetForegroundWindow
SetFocus
PostMessageW
PeekMessageW
OpenIcon
MoveWindow
ModifyMenuW
KillTimer
IsZoomed
InsertMenuW
GetWindowPlacement
GetMenuStringW
GetMenuItemCount
FindWindowW
DrawMenuBar
DispatchMessageW
DeleteMenu
DefWindowProcW
CreatePopupMenu
CreateDialogParamW
BringWindowToTop
AppendMenuW
LockWorkStation
ExitWindowsEx
RemoveMenu
CharUpperW
GetGuiResources
GetMenuState
CheckMenuItem
ReleaseDC
GetSystemMetrics
GetDC
FillRect
InflateRect
EndPaint
DrawTextW
CallWindowProcW
BeginPaint
wsprintfW
TrackPopupMenu
TileWindows
SwitchToThisWindow
ShowWindowAsync
SetWindowTextW
SetWindowPos
SetWindowLongPtrW
SetMenuDefaultItem
SendMessageW
SendMessageTimeoutW
PostThreadMessageW
MapWindowPoints
LoadMenuW
IsWindowVisible
IsWindow
InvalidateRect
GetWindowTextW
GetWindowRect
GetWindow
GetWindowLongPtrW
GetSubMenu
DialogBoxParamW
GetParent
gdi32
ExtTextOutW
SaveDC
RestoreDC
ExcludeClipRect
SetBkColor
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetTextColor
SelectObject
GetStockObject
shell32
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
ShellAboutW
shlwapi
StrFormatByteSizeW
comctl32
CreateStatusWindowW
InitCommonControls
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Create
msvcrt
wcslen
wcscpy
wcscmp
wcsncpy
__lconv_init
signal
_wcsicmp
_wcmdln
__winitenv
_initterm
_fpreset
_cexit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__setusermatherr
malloc
wcschr
_snwprintf
_wcsnicmp
wcsstr
_vsnwprintf
_ultow
memset
memcpy
labs
kernel32
CloseHandle
GetProcessAffinityMask
OpenProcess
SetProcessAffinityMask
TlsGetValue
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
Sleep
SetUnhandledExceptionFilter
GetStartupInfoW
WaitForSingleObject
SetProcessShutdownParameters
lstrlenW
LoadLibraryA
GetExitCodeThread
GetCurrentProcessId
FormatMessageW
CreateMutexW
GetLastError
GetCurrentProcess
LoadLibraryW
FreeLibrary
GetNumberFormatW
GetLocaleInfoW
QueryDosDeviceW
GetSystemInfo
GetSystemDirectoryW
GetPriorityClass
GetExitCodeProcess
SetPriorityClass
ReadProcessMemory
LocalFree
LeaveCriticalSection
InitializeCriticalSection
GetProcessIoCounters
EnterCriticalSection
DeleteCriticalSection
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
TerminateProcess
CreateProcessW
CreateEventW
CreateThread
HeapAlloc
GetProcessHeap
GetProcAddress
GetModuleHandleW
HeapFree
ntdll
NtQueryInformationProcess
NtQuerySystemInformation
NtShutdownSystem
NtSetSystemPowerState
RtlNtStatusToDosError
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 503KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ