Static task
static1
Behavioral task
behavioral1
Sample
00e603a2365381652b3f685eed18daa7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00e603a2365381652b3f685eed18daa7.exe
Resource
win10v2004-20231215-en
General
-
Target
00e603a2365381652b3f685eed18daa7
-
Size
481KB
-
MD5
00e603a2365381652b3f685eed18daa7
-
SHA1
64c9d783810f8ebff9864d969c3d84db7f96fc30
-
SHA256
7158dacb58afeb5e6971b4e915e8d49b4d2014155cbea90bb91e54d988f3643e
-
SHA512
fc358a2d479855028299eee60a6f893ddc90404c01351635b2ee15e9193e9b9558b2425f3b76d3383e2d9cd0242d003fdf504d0dfa120f9fefc6e4a8ce29645f
-
SSDEEP
12288:XO71QnahHVy6xZDIZLRuIqggbgV/MN26NQQC5Qz+Xi7W5ZGNj1S:Xg5IqgtBC26NdGQzLyZu1S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00e603a2365381652b3f685eed18daa7
Files
-
00e603a2365381652b3f685eed18daa7.exe windows:4 windows x86 arch:x86
6fe996792d09029944aa1a1047177690
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetOutlineTextMetricsW
PolyBezierTo
user32
VkKeyScanW
GetMenuState
wininet
GopherGetAttributeA
InternetOpenW
FtpCreateDirectoryW
GetUrlCacheHeaderData
comdlg32
FindTextW
GetOpenFileNameW
LoadAlterBitmap
kernel32
TlsAlloc
VirtualAlloc
GetCommandLineW
SetConsoleWindowInfo
EnumSystemLocalesA
GetFileType
GetCurrentProcessId
VirtualFree
GetCurrentProcess
HeapDestroy
GetStartupInfoW
GetEnvironmentStringsW
IsValidLocale
InitializeCriticalSectionAndSpinCount
FindNextFileA
UnhandledExceptionFilter
DeleteCriticalSection
SetHandleCount
CompareStringW
GetModuleHandleA
TlsGetValue
GetModuleFileNameA
GetLocaleInfoW
GetComputerNameW
GetLastError
ContinueDebugEvent
VirtualQuery
GetVersionExA
HeapReAlloc
WriteFile
GetNumberFormatA
FreeEnvironmentStringsA
RtlFillMemory
InterlockedExchange
EnumDateFormatsExW
WriteConsoleOutputA
LeaveCriticalSection
FileTimeToSystemTime
TlsFree
ExitProcess
CompareStringA
GetTickCount
HeapFree
RtlUnwind
HeapCreate
TlsSetValue
GetProcAddress
MultiByteToWideChar
GetCommandLineA
DeleteFiber
ReadConsoleOutputCharacterA
SetStdHandle
ExpandEnvironmentStringsW
GetProfileStringA
GetDateFormatA
GetStringTypeW
GetStdHandle
GetStartupInfoA
IsValidCodePage
GetSystemInfo
GetUserDefaultLCID
RemoveDirectoryA
GetOEMCP
GetTimeZoneInformation
GetCurrentThreadId
InitializeCriticalSection
GetACP
GetSystemTimeAsFileTime
TerminateProcess
LCMapStringW
GetLocaleInfoA
HeapSize
GetEnvironmentStrings
WideCharToMultiByte
IsBadWritePtr
EnterCriticalSection
GetStringTypeA
GlobalFree
VirtualProtect
LoadLibraryA
Sleep
GetCPInfo
HeapAlloc
GetTimeFormatA
GetModuleHandleW
QueryPerformanceCounter
GetThreadTimes
SetLastError
GetCurrentThread
GetModuleFileNameW
SetEnvironmentVariableA
FreeEnvironmentStringsW
LCMapStringA
OpenEventW
shell32
FreeIconList
SHGetNewLinkInfo
SHGetDesktopFolder
SHFileOperationW
ShellExecuteExA
ExtractAssociatedIconExA
SHEmptyRecycleBinW
SHBrowseForFolderA
DragQueryFile
ExtractIconA
SHGetDataFromIDListW
SHGetPathFromIDList
SheSetCurDrive
DragFinish
SHGetMalloc
SHGetPathFromIDListW
SHLoadInProc
SHAppBarMessage
SHFreeNameMappings
DragQueryFileW
SHGetSpecialFolderPathW
CheckEscapesW
RealShellExecuteExW
SHGetSpecialFolderLocation
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 309KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ