Static task
static1
Behavioral task
behavioral1
Sample
e487d140f25a102a4d5b3380eac6eafa3e8251ed8c713639c4ed3cb5e59b9935.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e487d140f25a102a4d5b3380eac6eafa3e8251ed8c713639c4ed3cb5e59b9935.exe
Resource
win10v2004-20231215-en
General
-
Target
e487d140f25a102a4d5b3380eac6eafa3e8251ed8c713639c4ed3cb5e59b9935
-
Size
6.0MB
-
MD5
50b611b571e842bd170a1fdddc84ae96
-
SHA1
833f23503c38624e32e62b8b9f87f27bf6c2150a
-
SHA256
e487d140f25a102a4d5b3380eac6eafa3e8251ed8c713639c4ed3cb5e59b9935
-
SHA512
966e06d40a0eba4856ae3d1058bf0cc0fa51da47bb7ab928ee0a465cfcfe277e8a83bd758e7483ffafa10a6140e5f350c08407559b0c91612dcb1c97d56ca44d
-
SSDEEP
98304:mvXUh/KYfD/GNBUJojYpWYPEazwpVn/+oJcXc7m3RKdV8fgLgsshg:mvXUhCuDe7UJi8WYPEacVnWiCoDf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e487d140f25a102a4d5b3380eac6eafa3e8251ed8c713639c4ed3cb5e59b9935
Files
-
e487d140f25a102a4d5b3380eac6eafa3e8251ed8c713639c4ed3cb5e59b9935.exe windows:4 windows x86 arch:x86
56a626882f0e9c658018ee386c925de1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
mpr
WNetCloseEnum
comctl32
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Read
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_SetIconSize
ImageList_Write
ord17
ImageList_GetBkColor
ImageList_EndDrag
ImageList_DrawEx
ImageList_DragShowNolock
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_Add
ImageList_DragMove
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetCurrentProcessId
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetCommandLineA
GetStartupInfoA
CloseHandle
CompareStringA
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
EnumCalendarInfoA
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
FreeResource
GetACP
GetComputerNameA
GetCPInfo
GetDateFormatA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetDriveTypeA
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetFileTime
GetCurrentThreadId
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetTickCount
GetStdHandle
GetStringTypeExA
GetSystemDirectoryA
GetSystemInfo
GetTempPathA
GetThreadLocale
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
MapViewOfFile
MoveFileA
MulDiv
MultiByteToWideChar
OpenMutexA
OpenProcess
QueryPerformanceFrequency
RaiseException
ReadFile
RemoveDirectoryA
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetThreadLocale
SetThreadPriority
SizeofResource
Sleep
TerminateProcess
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
WritePrivateProfileStringA
lstrcpyW
GetSystemDefaultLCID
GetLocalTime
GetTimeZoneInformation
GetProcAddress
GetFileType
user32
DrawIconEx
DrawMenuBar
DrawTextA
EmptyClipboard
EnableMenuItem
EnableScrollBar
EnableWindow
EndPaint
EnumThreadWindows
EnumWindows
EqualRect
FillRect
FindWindowA
FrameRect
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassInfoA
GetClassNameA
GetClientRect
GetClipboardData
GetCursorPos
GetDCEx
GetDesktopWindow
GetDlgItem
GetDoubleClickTime
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyboardLayoutList
GetKeyboardState
GetKeyboardType
GetKeyNameTextA
GetKeyState
GetLastActivePopup
GetMessagePos
GetMessageTime
GetParent
GetPropA
GetScrollInfo
GetScrollPos
GetScrollRange
GetSubMenu
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindowDC
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
InflateRect
InsertMenuA
InsertMenuItemA
IntersectRect
InvalidateRect
IsChild
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadKeyboardLayoutA
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MessageBoxA
DrawFrameControl
OemToCharA
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WaitMessage
WindowFromPoint
WinHelpA
VkKeyScanW
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CharUpperBuffA
CharToOemA
CharNextA
CharLowerBuffA
CharLowerA
CallWindowProcA
DrawFocusRect
DrawEdge
DispatchMessageA
MsgWaitForMultipleObjects
DestroyWindow
CallNextHookEx
BeginPaint
AdjustWindowRectEx
ActivateKeyboardLayout
CloseClipboard
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseServiceHandle
ControlService
DeleteService
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegFlushKey
RegCreateKeyExA
OpenServiceA
OpenSCManagerA
GetUserNameA
shell32
Shell_NotifyIconA
ExtractIconExA
ShellExecuteA
ole32
ProgIDFromCLSID
CoTaskMemFree
CoCreateInstance
StringFromCLSID
CoGetClassObject
CoTaskMemAlloc
OleUninitialize
OleSetMenuDescriptor
OleInitialize
OleDraw
IsAccelerator
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
msvcrt
_exit
_adjust_fdiv
exit
_except_handler3
__p__fmode
__set_app_type
__p__commode
_XcptFilter
_acmdln
_controlfp
__getmainargs
_initterm
__setusermatherr
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ctls0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 916KB - Virtual size: 913KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jetb Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE