Static task
static1
Behavioral task
behavioral1
Sample
e0c3cf5cf449b4cbcf44f40fba840bfa94db6a8f9294b67eb9179ae6fa01c4ec.exe
Resource
win10v2004-20231023-en
General
-
Target
e0c3cf5cf449b4cbcf44f40fba840bfa94db6a8f9294b67eb9179ae6fa01c4ec
-
Size
277KB
-
MD5
228831af6e66e8fec72798514a2d975a
-
SHA1
c99467c74f66613c9ccd5852894e22fad756406d
-
SHA256
e0c3cf5cf449b4cbcf44f40fba840bfa94db6a8f9294b67eb9179ae6fa01c4ec
-
SHA512
e2bba0377c2a06d8590a2dbb0392ad47960c811a9649efd4e8094dc98c43d91bfea5ad5c6cf59acfaab39732417131660daf68f35dbe8912d5cbcc99e79c3f35
-
SSDEEP
3072:PviLDBwgSArT1uY2R22PON4jvQtQy0J82IttNtySkvMb/fuDQEVWL5N18dEep+I2:qznkY2R2dNSSQpJvO8hv2WZW1KEeML
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0c3cf5cf449b4cbcf44f40fba840bfa94db6a8f9294b67eb9179ae6fa01c4ec
Files
-
e0c3cf5cf449b4cbcf44f40fba840bfa94db6a8f9294b67eb9179ae6fa01c4ec.exe windows:5 windows x86 arch:x86
c001cbd1a4a4c74d1eb06d60e4b8b11c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
GlobalAddAtomA
EndUpdateResourceW
GetConsoleAliasA
CreateJobObjectW
FreeEnvironmentStringsA
GetModuleHandleW
CreateNamedPipeW
GetWindowsDirectoryA
GetGeoInfoW
GetVolumePathNameW
LoadLibraryW
GetSystemWindowsDirectoryA
InterlockedPopEntrySList
GetNamedPipeInfo
CreateFileW
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
GetConsoleAliasExesLengthA
EnumDateFormatsExA
RemoveDirectoryA
GetPrivateProfileStringA
OpenWaitableTimerA
Process32FirstW
LocalAlloc
CreateFileMappingW
GetNumberFormatW
SetConsoleWindowInfo
GetSystemInfo
GlobalFindAtomW
FindFirstVolumeMountPointA
ReadConsoleInputW
TlsAlloc
GetCurrentProcessId
GetConsoleProcessList
SearchPathW
SetLocalTime
DebugActiveProcess
VirtualAlloc
ReadFile
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetModuleHandleA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
GetStringTypeA
user32
GetMessageExtraInfo
CharToOemBuffA
gdi32
GetCharABCWidthsFloatW
advapi32
LogonUserA
ReadEventLogA
shell32
ShellAboutW
ole32
CoRegisterPSClsid
winhttp
WinHttpCheckPlatform
Sections
.text Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 714KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ