Static task
static1
Behavioral task
behavioral1
Sample
e04e51f02689228cb7fa35c1f7058260ca752ae53be837a5765c37cb60bd049a.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
e04e51f02689228cb7fa35c1f7058260ca752ae53be837a5765c37cb60bd049a.exe
Resource
win10v2004-20231020-en
General
-
Target
e04e51f02689228cb7fa35c1f7058260ca752ae53be837a5765c37cb60bd049a
-
Size
172KB
-
MD5
06cd8f203853a675d7a3c4b3f6547e63
-
SHA1
c364764c0af770a6641c7dbdd15fe9f58193c789
-
SHA256
e04e51f02689228cb7fa35c1f7058260ca752ae53be837a5765c37cb60bd049a
-
SHA512
fa75bfe6d0c493939b209c7c579414e6401d3a6335fb2d5a000b027310b4ddb6ace9fae36560f691180a76c3cf5a683394641e22fa891683a666b4ad2236e38a
-
SSDEEP
3072:F0e5j4GqC8Y3Yjv4mW3o6z741xiIy4ZWvDI:F0e5lf3Yc3J7qZWU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e04e51f02689228cb7fa35c1f7058260ca752ae53be837a5765c37cb60bd049a
Files
-
e04e51f02689228cb7fa35c1f7058260ca752ae53be837a5765c37cb60bd049a.exe windows:4 windows x64
79b6383ae792c49f1d8266bfaf329390
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
ntdll
NtReadFile
NtWriteFile
RtlNtStatusToDosError
advapi32
RegCloseKey
RegCreateKeyExW
RegSetValueExW
SystemFunction036
bcrypt
BCryptGenRandom
kernel32
AcquireSRWLockExclusive
AddVectoredExceptionHandler
CloseHandle
CompareStringOrdinal
CreateFileW
CreateNamedPipeW
CreateProcessW
CreateThread
CreateToolhelp32Snapshot
DuplicateHandle
FormatMessageW
FreeEnvironmentStringsW
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetEnvironmentStringsW
GetEnvironmentVariableW
GetFileAttributesW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetStdHandle
GetSystemDirectoryW
GetSystemInfo
GetSystemTimes
GetTempPathW
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitOnceBeginInitialize
InitOnceComplete
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
ReadFileEx
ReleaseSRWLockExclusive
SetHandleInformation
SetLastError
SetThreadStackGuarantee
SetUnhandledExceptionFilter
Sleep
SleepEx
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
WaitForSingleObject
WriteConsoleW
WriteFileEx
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
VirtualProtect
VirtualQuery
__C_specific_handler
ws2_32
WSACleanup
WSAGetLastError
WSASocketW
WSAStartup
closesocket
connect
getsockopt
ioctlsocket
recv
select
send
setsockopt
msvcrt
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_commode
_fmode
_fpreset
_initterm
_onexit
abort
calloc
exit
fprintf
free
fwrite
malloc
memcmp
memcpy
memmove
memset
signal
strlen
strncmp
vfprintf
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 608B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ