Static task
static1
Behavioral task
behavioral1
Sample
01eb44f91773bdbb1a79b2facddb6d76.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01eb44f91773bdbb1a79b2facddb6d76.exe
Resource
win10v2004-20231222-en
General
-
Target
01eb44f91773bdbb1a79b2facddb6d76
-
Size
10.1MB
-
MD5
01eb44f91773bdbb1a79b2facddb6d76
-
SHA1
42e2e2bf877d56025666f0ee2b03e5c040cc1742
-
SHA256
6e4d7b3eb429dac672e4eeb2da391b8ae06f324be575ea0f3b21ffef18aad964
-
SHA512
38ed1f41989b6e11d6bfbdb8283a94b1b8f4c531d0898edca7df2631ced522a4385f623c611bcd4d1029cb44fd5797d2b5decdcdfc159c184b084c201ca8230a
-
SSDEEP
49152:8HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01eb44f91773bdbb1a79b2facddb6d76
Files
-
01eb44f91773bdbb1a79b2facddb6d76.exe windows:5 windows x86 arch:x86
65cee1cc96d935afa5d7eb55e18fefb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
FindFirstFileW
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
OpenSemaphoreA
CreateDirectoryExA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
WriteFileGather
FindResourceExA
GetPrivateProfileStructW
SetVolumeMountPointA
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CreateFileW
CompareStringW
GetACP
lstrlenW
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
HeapReAlloc
SetCurrentDirectoryA
OpenMutexW
IsDBCSLeadByteEx
GetProcAddress
SetVolumeLabelW
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
SetFileApisToOEM
Process32FirstW
OpenWaitableTimerW
LocalAlloc
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
CloseHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
RaiseException
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
DecodePointer
ExitProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
IsProcessorFeaturePresent
FlushFileBuffers
user32
GetCursorInfo
GetMenuInfo
GetMessageTime
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9.8MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ