Static task
static1
Behavioral task
behavioral1
Sample
ebf6c9622c33f4c3e8ba61877c44f8b68f0c81676aeef956b14d1bbdbe4be896.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ebf6c9622c33f4c3e8ba61877c44f8b68f0c81676aeef956b14d1bbdbe4be896.exe
Resource
win10v2004-20231020-en
General
-
Target
ebf6c9622c33f4c3e8ba61877c44f8b68f0c81676aeef956b14d1bbdbe4be896
-
Size
4.1MB
-
MD5
b3267ddc08fc60737a688370ac6fef57
-
SHA1
eeb004decadc1878918abdb46a5c92041d47c483
-
SHA256
ebf6c9622c33f4c3e8ba61877c44f8b68f0c81676aeef956b14d1bbdbe4be896
-
SHA512
5a525cd5fcee36186df0090a67e5855a220c91aa3b2b7cd1969b5a8b9adfa133a5bfea40eb3b74573ee65eebe3fd18d4e1016d62f232e5da7a4a8eb057ff3e1f
-
SSDEEP
98304:x72mV0RuM0sK62eq9zB0sW/WOu4ftLHLEXqgs4+SWafr:5gl0sKfeYvW/WOuOcDs5a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebf6c9622c33f4c3e8ba61877c44f8b68f0c81676aeef956b14d1bbdbe4be896
Files
-
ebf6c9622c33f4c3e8ba61877c44f8b68f0c81676aeef956b14d1bbdbe4be896.exe windows:5 windows x86
cd1ee025570816d66e1b644c4b305f4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetProcessHeap
LoadLibraryW
Sleep
ReadFile
CreateFileW
SetThreadPriority
GetHandleInformation
GetProcAddress
VirtualAlloc
IsDebuggerPresent
CloseHandle
GetModuleHandleW
CreateThread
InterlockedDecrement
LoadLibraryA
GetModuleHandleA
VirtualProtect
lstrlenW
GetPrivateProfileIntW
VirtualProtectEx
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
SetUnhandledExceptionFilter
OutputDebugStringW
WaitForSingleObject
SetHandleInformation
HeapFree
GetCurrentProcess
HeapAlloc
CreateMutexW
GetFileSize
SuspendThread
ExitProcess
InitializeCriticalSection
GetModuleFileNameW
GetModuleHandleW
TerminateProcess
GetCurrentProcess
DeleteCriticalSection
LoadLibraryW
CreateEventW
CompareStringW
SetLastError
GetModuleHandleA
VirtualProtect
GetTickCount
EnterCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
WriteProcessMemory
CreateToolhelp32Snapshot
GetCurrentProcessId
GetCurrentThreadId
Thread32First
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
GetSystemInfo
FreeLibrary
LoadResource
MultiByteToWideChar
WideCharToMultiByte
FindResourceExW
FindResourceExA
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
GetSystemTime
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetCommandLineA
GetLastError
HeapFree
HeapAlloc
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
HeapSize
LoadLibraryA
GetLocaleInfoA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
VirtualQuery
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
DestroyWindow
EndPaint
LoadStringW
MessageBoxA
KillTimer
SetTimer
BeginPaint
GetDC
RegisterClassExW
PeekMessageW
ShowWindow
CreateWindowExW
LoadCursorW
UnregisterClassW
GetSystemMetrics
UpdateWindow
DispatchMessageW
DefWindowProcW
MessageBoxW
CharUpperBuffW
wsprintfW
gdi32
DeleteObject
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateSolidBrush
CreateDIBitmap
psapi
GetModuleFileNameExW
imagehlp
CheckSumMappedFile
comctl32
InitCommonControlsEx
Sections
Size: 252KB - Virtual size: 560KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1.9MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 20KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 616KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VProtect Size: 616KB - Virtual size: 616KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VProtect Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VProtect Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
.vmp1 Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE