Static task
static1
Behavioral task
behavioral1
Sample
e9a67b540ada517e8c75b8ecead0d168951b155134ff860fa7d087763ee7b4e3.exe
Resource
win7-20231020-en
General
-
Target
e9a67b540ada517e8c75b8ecead0d168951b155134ff860fa7d087763ee7b4e3
-
Size
1.7MB
-
MD5
f20a97c5b5234949b17e4ad514a1eaef
-
SHA1
a215717ecb1e9f82a4d55219b4cfba0367b7d236
-
SHA256
e9a67b540ada517e8c75b8ecead0d168951b155134ff860fa7d087763ee7b4e3
-
SHA512
25ecbf760769ec713a91549659b5850b73f73f37d10b77ca424baef27316aad5ceba45cf2d7bf4042df0b6fb4823d6cc3f4ac0a8bbfa32aa25e71d0c40b20b0a
-
SSDEEP
12288:DzC5VMdhN3XRoJIjMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:DzZdhN3BmVSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9a67b540ada517e8c75b8ecead0d168951b155134ff860fa7d087763ee7b4e3
Files
-
e9a67b540ada517e8c75b8ecead0d168951b155134ff860fa7d087763ee7b4e3.exe windows:6 windows x64 arch:x64
3ef638834d6f1f60489243c96d9a2668
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLastError
Process32NextW
K32GetModuleBaseNameW
Process32FirstW
CloseHandle
RaiseException
K32EnumProcesses
DecodePointer
DeleteCriticalSection
Sleep
K32EnumProcessModules
FlushFileBuffers
CreateToolhelp32Snapshot
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
OpenProcess
InitializeCriticalSectionEx
CreateMutexW
GetSystemPowerStatus
GetEnvironmentVariableW
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCommandLineW
WideCharToMultiByte
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetProcessHeap
ReadFile
SetNamedPipeHandleState
WriteFile
CreateFileW
WaitNamedPipeW
IsDebuggerPresent
OutputDebugStringW
MultiByteToWideChar
GetStringTypeW
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
FreeLibrary
LoadLibraryExW
GetTimeZoneInformation
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapSize
EnterCriticalSection
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
user32
LoadStringW
advapi32
EventWrite
RegSetKeyValueW
RegCloseKey
EventRegister
RegCreateKeyExW
RegOpenKeyExW
RegGetValueW
EventUnregister
GetUserNameW
shell32
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoAllowSetForegroundWindow
CoInitializeEx
shlwapi
PathRemoveFileSpecW
imagehlp
MakeSureDirectoryPathExists
Sections
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 476B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE