Static task
static1
Behavioral task
behavioral1
Sample
ed4182405eba146f4943786a0a63bbbe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ed4182405eba146f4943786a0a63bbbe.exe
Resource
win10v2004-20231215-en
General
-
Target
ed4182405eba146f4943786a0a63bbbe
-
Size
202KB
-
MD5
ed4182405eba146f4943786a0a63bbbe
-
SHA1
922a7e87061d550da13169ad48861100bfd0caf9
-
SHA256
02235da951ca7aaabaaf1e061c054ce80062d2f6fbf7e09b11d2324693e65465
-
SHA512
843712b0b350372dc28a23878ebda51e703e89754fa91766ef5a159f40b029e86ff236038bbeaf8d92ad307f6d17a49d368c4eb672c4f4b24fd2c2e4279561f7
-
SSDEEP
3072:Z9q3yXGoE85Jzu6avs4fKwRyQLFj3pwjchDWTxSm2ejwQP6yJynwzh1jaE8i3Qr:Z9r2oE8rTs9vLFrKTxSm2exPRaEhrA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed4182405eba146f4943786a0a63bbbe
Files
-
ed4182405eba146f4943786a0a63bbbe.exe windows:4 windows x86 arch:x86
ecc129938c6b7ed891a7cb79dbb48dd8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
GetBkColor
GetCurrentObject
GetMapMode
GetNearestColor
GetNearestPaletteIndex
GetObjectType
GetPixelFormat
GetSystemPaletteUse
GetTextCharacterExtra
SetSystemPaletteUse
SetTextCharacterExtra
kernel32
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindResourceA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileType
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetTickCount
GetVersion
GlobalAlloc
GlobalSize
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
IsDebuggerPresent
IsProcessorFeaturePresent
LeaveCriticalSection
LoadResource
LocalFlags
LockResource
MoveFileA
MultiByteToWideChar
SetFilePointer
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
_fputchar
_getw
_itoa
_popen
_putenv
_strdup
_stricmp
_stricoll
_strlwr
_strnicmp
_strnset
_strrev
_strupr
_unlink
__doserrno
__getmainargs
__mb_cur_max
__p__daylight
__p__environ
__p__fmode
__p__winmajor
__set_app_type
_cexit
_copysign
_ctime64
_ecvt
_errno
_fcloseall
_fgetwchar
_filbuf
_findclose
_findfirst
_findnext
_flsbuf
_fputchar
_fullpath
_gcvt
_getws
_iob
_isctype
_itow
_memicmp
_mktime64
_nextafter
_onexit
_putenv
_putw
_setmaxstdio
_setmode
_splitpath
_stat64
_strerror
_strnicoll
_strnset
_strtime
_time64
_tzset
_wcsncoll
_wfopen
_wpopen
_wremove
abort
atexit
atof
atoi
calloc
exit
fclose
fflush
fgetwc
fgetws
fopen
fputc
free
fwprintf
fwrite
fwscanf
getenv
getwchar
isspace
localeconv
malloc
mbstowcs
memcmp
memcpy
memmove
memset
perror
putwc
rand
realloc
remove
rename
scanf
setbuf
setlocale
setvbuf
signal
sprintf
srand
strcat
strchr
strcmp
strcoll
strcpy
strlen
strncpy
strstr
swprintf
tolower
vfprintf
wcslen
wcstombs
user32
BeginPaint
CheckDlgButton
DrawTextA
EnableWindow
EndDialog
GetCursor
GetDialogBaseUnits
GetDlgItem
GetDlgItemInt
GetInputState
GetKeyboardType
GetMenuContextHelpId
GetPropA
GetScrollPos
GetWindowLongA
IsWindowEnabled
IsWindowUnicode
RemovePropA
SendMessageA
SetWindowTextA
ShowWindow
Sections
.text Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 113KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE