Static task
static1
Behavioral task
behavioral1
Sample
e6e2c8050007150cce9eb772b2dd0ad75da5bb4f740c521c9d4bba0ad5d0ea96.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e6e2c8050007150cce9eb772b2dd0ad75da5bb4f740c521c9d4bba0ad5d0ea96.exe
Resource
win10v2004-20231023-en
General
-
Target
e6e2c8050007150cce9eb772b2dd0ad75da5bb4f740c521c9d4bba0ad5d0ea96
-
Size
187KB
-
MD5
a288a0fc0cd9bb6b9095b26b320893b1
-
SHA1
c3beabd4696d8e7f00ebdcebb142eeb4bd8607e5
-
SHA256
e6e2c8050007150cce9eb772b2dd0ad75da5bb4f740c521c9d4bba0ad5d0ea96
-
SHA512
85f42a0fde28bde9c211a5e4b7870fb08f4a91ef126d8f6b0135918805a1150dc4ed69cf9192aa4077c1d898141eff177d8c9ac6d267ad7cd6e055822cfe4c9c
-
SSDEEP
3072:XNj7UJ0t0Z+kz0YCvkZ5QnR0KhGK8jpP5gc0oh:X9o0t++kz0YC8ZyqpKWKc0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6e2c8050007150cce9eb772b2dd0ad75da5bb4f740c521c9d4bba0ad5d0ea96
Files
-
e6e2c8050007150cce9eb772b2dd0ad75da5bb4f740c521c9d4bba0ad5d0ea96.exe windows:5 windows x86
493a4797a47ce987d5cf839e526fb2ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
ExitProcess
SetUnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalDeleteAtom
GetLocaleInfoA
InterlockedExchange
GetCurrentThreadId
GlobalFlags
GlobalAddAtomA
CreateFileA
GetCurrentProcess
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
LoadLibraryA
lstrcmpA
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
FreeLibrary
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
GetProcAddress
CompareStringA
GetLastError
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
lstrlenA
MultiByteToWideChar
GetModuleHandleA
GetConsoleWindow
GetPrivateProfileIntA
GetPrivateProfileStringA
TerminateProcess
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
QueryPerformanceCounter
GetModuleFileNameA
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
CreateWindowExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetForegroundWindow
IsIconic
PostMessageA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetFocus
GetClassInfoExA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadIconA
SendMessageA
GetMenu
gdi32
DeleteDC
RectVisible
GetStockObject
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
TextOutA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
shell32
ShellExecuteA
oleaut32
VariantInit
VariantClear
VariantChangeType
wininet
HttpAddRequestHeadersA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetCrackUrlA
InternetReadFile
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ