_UninstallRoutine@8
Static task
static1
Behavioral task
behavioral1
Sample
eda4515dde6fabe861868a2c1060b11be51fb87e51c69649ee476aacbe0b85d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
eda4515dde6fabe861868a2c1060b11be51fb87e51c69649ee476aacbe0b85d6.exe
Resource
win10v2004-20231215-en
General
-
Target
eda4515dde6fabe861868a2c1060b11be51fb87e51c69649ee476aacbe0b85d6
-
Size
376KB
-
MD5
5bfe2d20de79c4ed2d4c173346144fdb
-
SHA1
9c42919a7c77a6073d59b706faae0b188d21bfc2
-
SHA256
eda4515dde6fabe861868a2c1060b11be51fb87e51c69649ee476aacbe0b85d6
-
SHA512
2884453d2244c4c9ae001b8de40a839ec817b1326fb6c20201d20a312eb5699c450e5b7746323b39827a694503c5e90c94eed69d43c28c3e3758a60f94e6313d
-
SSDEEP
6144:n+ml5YX/jSuLDks6wSttIHNLcizTcxXtS+2tqGM4mF5sAOj/dxC0WKEy8JD0a5RR:7l53uLDks6wSttIHNLcizAxXYtA4OSdY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eda4515dde6fabe861868a2c1060b11be51fb87e51c69649ee476aacbe0b85d6
Files
-
eda4515dde6fabe861868a2c1060b11be51fb87e51c69649ee476aacbe0b85d6.exe windows:5 windows x86 arch:x86
13d4212069ea2a7ecd412962646a8f00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableW
ExpandEnvironmentStringsW
DeleteFileW
GetTempFileNameW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
IsDebuggerPresent
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
FatalAppExitW
HeapAlloc
HeapFree
GetProcessHeap
SetEvent
WaitForSingleObject
CreateEventW
SetWaitableTimer
Sleep
CreateWaitableTimerW
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
TerminateThread
GetExitCodeThread
ResumeThread
CreateProcessW
OpenProcess
GetTickCount
GetSystemDirectoryW
GetNativeSystemInfo
VirtualQuery
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LocalFree
FormatMessageW
GetPrivateProfileIntW
GetPrivateProfileStringW
CopyFileW
MoveFileExW
WideCharToMultiByte
GetLocaleInfoW
GetThreadLocale
GetSystemDefaultLCID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
OutputDebugStringA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
IsValidCodePage
CreateFileW
LoadLibraryW
GetCurrentThreadId
GetWindowsDirectoryW
IsWow64Process
DecodePointer
HeapReAlloc
HeapSize
GetConsoleMode
GetSystemInfo
VirtualProtect
LoadLibraryExA
lstrlenA
SwitchToThread
CreateThread
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
ExitProcess
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
WriteConsoleW
kvpvbsext
?RunScriptFile@ScriptInterpreter@@YGJPB_W00PAPAUtagSAFEARRAY@@PAUtagVARIANT@@@Z
Exports
Exports
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 76KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kvpver Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE