Static task
static1
Behavioral task
behavioral1
Sample
e86a06e2e640b6eef86909d79e97614d13bf547c2c7351993aaf9c37bb3f8117.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e86a06e2e640b6eef86909d79e97614d13bf547c2c7351993aaf9c37bb3f8117.exe
Resource
win10v2004-20231023-en
General
-
Target
e86a06e2e640b6eef86909d79e97614d13bf547c2c7351993aaf9c37bb3f8117
-
Size
39KB
-
MD5
184a29dba3096b2c25ff79c08313757e
-
SHA1
8a6587303876d65612d7f0af6a5a2e8bba940dcd
-
SHA256
e86a06e2e640b6eef86909d79e97614d13bf547c2c7351993aaf9c37bb3f8117
-
SHA512
f8e6f55313125b0fe192712419d8ebee4b7d2cc2d56abf50d1e5c732a955c0ded399236963b89c36981032d28127da0e3f5bccb34c4783977e36eecfb2135745
-
SSDEEP
768:TjshQqo4yz4NRBhPefZ3aawH3jv7SLllSk2PVer:TAAxUNRBhGEafxlh2Py
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e86a06e2e640b6eef86909d79e97614d13bf547c2c7351993aaf9c37bb3f8117
Files
-
e86a06e2e640b6eef86909d79e97614d13bf547c2c7351993aaf9c37bb3f8117.exe windows:5 windows x86
92b324a89411c2ce41ccf4d9d7adaece
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
TerminateThread
GlobalLock
GlobalSize
ExitProcess
GetVersionExA
GetComputerNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
SetUnhandledExceptionFilter
EncodePointer
IsDebuggerPresent
GetCurrentProcess
CheckRemoteDebuggerPresent
WinExec
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
ReadFile
GlobalAlloc
GlobalReAlloc
GetTempPathA
GlobalFree
GetModuleFileNameA
CreateThread
Sleep
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
GlobalUnlock
GetDriveTypeA
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
UnhandledExceptionFilter
user32
GetSystemMetrics
GetDC
ReleaseDC
IsRectEmpty
keybd_event
mouse_event
SetCursorPos
gdi32
GetStockObject
GetObjectA
SelectPalette
RealizePalette
GetDIBits
CreateDCA
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
DeleteObject
advapi32
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
shell32
ShellExecuteA
SHGetFileInfoA
ws2_32
inet_ntop
getaddrinfo
socket
freeaddrinfo
closesocket
select
listen
recv
send
inet_addr
connect
htons
bind
shutdown
WSACleanup
WSAStartup
WSASocketA
msvcr100
__getmainargs
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
strcpy
sprintf
strcmp
memset
fwrite
fclose
fopen
fread
ftell
fseek
_time64
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
strlen
free
fprintf
strcat
malloc
rand
srand
_access
system
printf
_amsg_exit
_initterm
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_lock
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ