Static task
static1
Behavioral task
behavioral1
Sample
eb9b50efe5d390ea04606e1b5b989b9bbe2d61b754967b27615bc37cddf6155e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
eb9b50efe5d390ea04606e1b5b989b9bbe2d61b754967b27615bc37cddf6155e.exe
Resource
win10v2004-20231020-en
General
-
Target
eb9b50efe5d390ea04606e1b5b989b9bbe2d61b754967b27615bc37cddf6155e
-
Size
4.6MB
-
MD5
1dc42a9b0d4b3893c9e97464e229556f
-
SHA1
d6dc0dfb7d1cecfa158d910b0e7d1fd69fa92570
-
SHA256
eb9b50efe5d390ea04606e1b5b989b9bbe2d61b754967b27615bc37cddf6155e
-
SHA512
3800827bd43905ade87f772df8e776f5a4086f3f39a46925cd4c0d2da02812802bdddfd05dbbc791b3a573b03fc46f15333978d06aabf55d452da704ffe16c8e
-
SSDEEP
98304:uLjqKFJDhkPszvcgWZrcAuyDy9tBlTBq1hPWPpkGi2vW9M5/7YeM3uO1p:GjqKSPszvQ+2ABlI1h+xkGi2vC2jYB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb9b50efe5d390ea04606e1b5b989b9bbe2d61b754967b27615bc37cddf6155e
Files
-
eb9b50efe5d390ea04606e1b5b989b9bbe2d61b754967b27615bc37cddf6155e.exe windows:6 windows x86
374aef103dde651c6c44e331f362c8b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
GetCurrentDirectoryW
GetCurrentProcessId
CreateProcessW
WideCharToMultiByte
VirtualQuery
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
lstrcmpiW
LoadLibraryExW
WriteFile
SetFileTime
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
SystemTimeToFileTime
UnmapViewOfFile
WriteConsoleW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
LCMapStringW
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
GetStdHandle
GetCommandLineA
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GlobalFlags
MultiByteToWideChar
GetFileAttributesW
FindClose
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
CloseHandle
ReadFile
CreateDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
GetTickCount
FindResourceW
LoadResource
LockResource
FreeResource
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
LeaveCriticalSection
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
GetTempPathW
ExitProcess
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
HeapFree
user32
GetClassInfoExW
CharNextW
wsprintfW
DeleteMenu
DestroyAcceleratorTable
PostQuitMessage
TranslateAcceleratorW
GetDlgItem
GetWindowThreadProcessId
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
RegisterClassExW
GetWindowTextW
EndPaint
GetNextDlgTabItem
BeginPaint
DestroyMenu
IsIconic
GetClassNameW
UnregisterClassW
GetFocus
GetActiveWindow
GetDesktopWindow
MessageBoxW
IsWindow
SetFocus
DestroyWindow
DefWindowProcW
DispatchMessageW
TranslateMessage
IntersectRect
IsRectEmpty
WinHelpW
SetMenu
IsWindowEnabled
GetSysColor
IsChild
GetDlgCtrlID
IsDialogMessageW
DrawIcon
FillRect
IsWindowVisible
CallWindowProcW
GetSystemMenu
GetLastActivePopup
GetWindowTextLengthW
DrawTextW
SetWindowRgn
SetRect
IsZoomed
GetTopWindow
ClientToScreen
DestroyIcon
RedrawWindow
ScreenToClient
GetMonitorInfoW
GetMessageW
PeekMessageW
GetWindowLongW
SendMessageW
SetWindowTextW
InvalidateRect
SetWindowPos
SetWindowLongW
GetKeyState
SetCursor
GetWindow
ShowWindow
EnableWindow
AdjustWindowRectEx
ReleaseDC
GetClientRect
GetSystemMetrics
GetDC
GetWindowRect
LoadImageW
GetParent
LoadCursorW
LoadIconW
EnumWindows
PostMessageW
CreateWindowExW
LoadStringW
gdi32
CreateEllipticRgn
CreateSolidBrush
CreateRoundRectRgn
GetClipBox
SetBkMode
SetTextColor
CombineRgn
CreateRectRgn
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GdiAlphaBlend
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
SetStretchBltMode
DeleteObject
CreateFontIndirectW
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
DragFinish
DragQueryFileW
Shell_NotifyIconW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
ws2_32
WSACleanup
Sections
.text Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ