Static task
static1
Behavioral task
behavioral1
Sample
e2331af460fa7d731eda06bfa97fa9e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e2331af460fa7d731eda06bfa97fa9e2.exe
Resource
win10v2004-20231215-en
General
-
Target
e2331af460fa7d731eda06bfa97fa9e2
-
Size
10.3MB
-
MD5
e2331af460fa7d731eda06bfa97fa9e2
-
SHA1
47c7e1a4118f09ab418a1571a8c4df8814bf613e
-
SHA256
239b1b338a8cd81d3b33fb7e261f16c8a78f7d337da5342519b4c5d639b94c9c
-
SHA512
c9e905f1737bfd55fc1ae8ba16fcf4a9eb1fd3629f45ecc0a723b410fcd6465172673b4f2a1428b6aa942d19c4fbc29cc021d3184186c21410f1302398727591
-
SSDEEP
98304:clBjfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffH:I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2331af460fa7d731eda06bfa97fa9e2
Files
-
e2331af460fa7d731eda06bfa97fa9e2.exe windows:5 windows x86 arch:x86
608b2f913ee4f0a13d91907217899a92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringW
GetTickCount
GetCommConfig
IsBadReadPtr
GetPrivateProfileStringW
FormatMessageA
SetFileTime
GetCompressedFileSizeW
EnumTimeFormatsA
GetCommandLineA
InitializeCriticalSection
LoadLibraryW
IsValidLocale
Sleep
GetCalendarInfoA
WritePrivateProfileStructW
HeapValidate
GetTapePosition
GetFileAttributesW
GetTimeZoneInformation
FlushInstructionCache
GetConsoleOutputCP
GetLastError
InterlockedFlushSList
GetCurrentDirectoryW
GetLongPathNameW
GetThreadLocale
HeapUnlock
GetFirmwareEnvironmentVariableW
LockFileEx
SetTapeParameters
SetTimerQueueTimer
DefineDosDeviceA
GetAtomNameA
OpenMutexA
CreateSemaphoreW
LocalAlloc
GetExitCodeThread
OpenEventA
AddAtomA
OpenJobObjectW
GetThreadPriority
WaitCommEvent
GetModuleHandleA
GetProcessShutdownParameters
CancelTimerQueueTimer
FreeEnvironmentStringsW
VirtualProtect
OpenEventW
GetShortPathNameW
CloseHandle
MoveFileWithProgressW
FindNextVolumeA
lstrcpyA
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
CallNamedPipeW
GetSystemDefaultLCID
SetComputerNameW
GetFullPathNameW
UpdateResourceA
SetEndOfFile
IsBadHugeReadPtr
GetDriveTypeW
GetConsoleAliasExesA
TlsGetValue
WritePrivateProfileStructA
lstrlenA
WriteConsoleOutputCharacterW
CreateTimerQueue
GetVolumeNameForVolumeMountPointA
VerLanguageNameW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
HeapFree
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
GetProcessHeap
ExitProcess
GetModuleHandleExW
HeapSize
GetCurrentThreadId
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetACP
IsValidCodePage
GetOEMCP
HeapReAlloc
LoadLibraryExW
GetConsoleCP
GetConsoleMode
user32
GetMonitorInfoA
ShowCursor
LookupIconIdFromDirectoryEx
OpenInputDesktop
advapi32
RegQueryValueExA
AccessCheckByTypeResultListAndAuditAlarmW
InitiateSystemShutdownW
QueryServiceConfigW
ConvertToAutoInheritPrivateObjectSecurity
AddAccessAllowedAce
RegSaveKeyA
RegConnectRegistryW
RegOpenKeyExA
LookupPrivilegeValueA
GetOldestEventLogRecord
ObjectDeleteAuditAlarmW
RegisterServiceCtrlHandlerA
EnumServicesStatusA
CreateServiceW
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 782KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.1MB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ