Static task
static1
Behavioral task
behavioral1
Sample
01e600b0608d62530a7dccf8e4236835.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01e600b0608d62530a7dccf8e4236835.exe
Resource
win10v2004-20231215-en
General
-
Target
01e600b0608d62530a7dccf8e4236835
-
Size
266KB
-
MD5
01e600b0608d62530a7dccf8e4236835
-
SHA1
19b8e60e940c0a8702af7ad52c0ea6be0cc05833
-
SHA256
c1be5ccaaa2e1d88508e3a5cbd6081523bec0c393ba6a50731e2a600e740ff41
-
SHA512
16f262cc0f26c5f1d09c2b4a4c996a6ce8fbe62411962e099fbf9994c54001867630019553477587f4122e830775d8f199c6b87bab53013a7848638ad1f5363f
-
SSDEEP
6144:/cQfb8fIfp/hYX4rBJq56IyjlfKUizMqYsPThkndtc:/cSb8fIfpZYX0BJ86IyAnzMqYmWdt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01e600b0608d62530a7dccf8e4236835
Files
-
01e600b0608d62530a7dccf8e4236835.exe windows:4 windows x86 arch:x86
915444ea2cf3f5249db0ba9847512090
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetAtomNameA
InterlockedDecrement
TransactNamedPipe
RtlUnwind
GetProcessHeap
ResumeThread
GetCurrentProcess
GetFileType
VirtualAlloc
IsValidCodePage
HeapSize
HeapReAlloc
GetCurrentThread
HeapDestroy
GetCommandLineA
DeleteCriticalSection
IsDebuggerPresent
GetModuleFileNameA
EnumSystemLocalesA
GetOEMCP
ExitProcess
FreeLibrary
GetLocaleInfoW
WideCharToMultiByte
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetLastError
CompareStringW
GetTimeZoneInformation
QueryPerformanceCounter
SetUnhandledExceptionFilter
LeaveCriticalSection
HeapValidate
LCMapStringW
SetHandleCount
CompareStringA
HeapAlloc
GetEnvironmentStrings
HeapFree
SetThreadPriority
UnhandledExceptionFilter
GetCurrentProcessId
GetThreadTimes
GetStartupInfoA
VirtualFree
SetConsoleCtrlHandler
GetTimeFormatA
GetPrivateProfileSectionA
GetACP
GetStdHandle
EnterCriticalSection
TlsFree
MultiByteToWideChar
FindResourceW
DebugActiveProcess
TlsSetValue
TlsGetValue
TlsAlloc
GlobalGetAtomNameW
OpenFileMappingW
LCMapStringA
WriteFile
OpenEventW
lstrcpyn
GetStringTypeW
GetProcAddress
GetCPInfo
GetDateFormatA
OpenWaitableTimerA
InitializeCriticalSection
InterlockedExchange
GetUserDefaultLCID
Sleep
GetEnvironmentStringsW
VirtualQuery
SetLastError
SetEnvironmentVariableA
GetFullPathNameW
InterlockedIncrement
GetCurrentThreadId
GetVersionExA
SetComputerNameW
TerminateProcess
FreeEnvironmentStringsW
HeapCreate
GetPrivateProfileIntW
GetModuleHandleA
IsValidLocale
GetLocaleInfoA
GetStringTypeA
DeleteFileW
shell32
RealShellExecuteA
ShellExecuteExA
CheckEscapesW
ShellExecuteExW
ShellExecuteW
SHGetPathFromIDListA
ShellAboutW
ShellHookProc
SHBrowseForFolderW
SHUpdateRecycleBinIcon
ExtractAssociatedIconA
SheGetDirA
wininet
IsUrlCacheEntryExpiredW
FindNextUrlCacheEntryExA
InternetDial
InternetCanonicalizeUrlW
SetUrlCacheEntryGroup
FtpOpenFileA
InternetCheckConnectionA
InternetShowSecurityInfoByURLW
FindFirstUrlCacheEntryW
InternetGetCertByURL
ReadUrlCacheEntryStream
InternetGetCertByURLA
InternetReadFile
FtpGetFileEx
InternetOpenA
HttpQueryInfoA
ShowSecurityInfo
GopherFindFirstFileW
InternetOpenUrlW
InternetErrorDlg
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ