Static task
static1
Behavioral task
behavioral1
Sample
ea6b341cf044a639c64cc2cf27383229a30efc345163843fcaf98fea7fa812b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea6b341cf044a639c64cc2cf27383229a30efc345163843fcaf98fea7fa812b0.exe
Resource
win10v2004-20231215-en
General
-
Target
ea6b341cf044a639c64cc2cf27383229a30efc345163843fcaf98fea7fa812b0
-
Size
1.1MB
-
MD5
501ce31dfddd6792c88e71d560af38d0
-
SHA1
a34fe632cc4304ae54fc2d5e32bf0494a746d1b7
-
SHA256
ea6b341cf044a639c64cc2cf27383229a30efc345163843fcaf98fea7fa812b0
-
SHA512
dbee1c24a2ef92f7c27f434a996250531f2062e45a299c26feac5fa40c14017acd85310a9dde5f73ba82b777663c3151252c20b2ba5dc53822b54e4785b3b9fa
-
SSDEEP
12288:DJ9oE/7z5FkVQYJ36JgW5cfBkPtWgS/pdPcrGuXQ1hXGj:DJ9oE/7zYVQYJ36JgGcZkPto9Gj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea6b341cf044a639c64cc2cf27383229a30efc345163843fcaf98fea7fa812b0
Files
-
ea6b341cf044a639c64cc2cf27383229a30efc345163843fcaf98fea7fa812b0.exe windows:4 windows x86 arch:x86
a745306b35a7a5efda9f5a4e34cdf02a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DeleteFileW
DuplicateHandle
ExitProcess
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
FreeEnvironmentStringsW
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameW
GetLocalTime
GetModuleHandleW
GetOEMCP
GetProcAddress
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetTempFileNameW
GetTempPathW
GetTickCount
GetTimeFormatW
GetVolumeInformationW
HeapAlloc
HeapReAlloc
IsBadStringPtrW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
ReadConsoleW
ReadFile
RemoveDirectoryW
SearchPathW
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetStdHandle
SetVolumeLabelW
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
lstrcmpiW
ntdll
RtlGetVersion
_vsnprintf
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_time32
_wcsicmp
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wsplitpath
exit
fclose
feof
fgetws
free
fwrite
getenv
iswdigit
iswspace
malloc
memchr
memcmp
memcpy
memmove
memset
qsort
rand
realloc
srand
strchr
strcmp
strcpy
strcspn
strlen
tolower
toupper
towlower
towupper
wcschr
wcscspn
wcslen
wcsncmp
wcspbrk
wcsrchr
wcsstr
wcstol
wcstoul
user32
CharNextExA
CharUpperBuffW
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
wsprintfW
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 772KB - Virtual size: 770KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ