Static task
static1
Behavioral task
behavioral1
Sample
ee11cbba1a9e2fc4040eb375f6098e87.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ee11cbba1a9e2fc4040eb375f6098e87.exe
Resource
win10v2004-20231215-en
General
-
Target
ee11cbba1a9e2fc4040eb375f6098e87.exe
-
Size
14.8MB
-
MD5
ee11cbba1a9e2fc4040eb375f6098e87
-
SHA1
8e38cdb81c3bb7ed36d9b123e8888b40891aebd5
-
SHA256
fb698c5c6159ef2711117c9647aafde06c6a561bed01b2e6ea9a5286f5227822
-
SHA512
5c43e14e34b069b4030fac7eb0f3c97f724ea9a3022a93979ee9384435ba173554f452bde1dcb628391c9e4e1f0f217c9d83fbcb0d79e5c64c9b10d54149a8b5
-
SSDEEP
49152:bHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee11cbba1a9e2fc4040eb375f6098e87.exe
Files
-
ee11cbba1a9e2fc4040eb375f6098e87.exe.exe windows:5 windows x86 arch:x86
65cee1cc96d935afa5d7eb55e18fefb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
FindFirstFileW
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
OpenSemaphoreA
CreateDirectoryExA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
WriteFileGather
FindResourceExA
GetPrivateProfileStructW
SetVolumeMountPointA
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CreateFileW
CompareStringW
GetACP
lstrlenW
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
HeapReAlloc
SetCurrentDirectoryA
OpenMutexW
IsDBCSLeadByteEx
GetProcAddress
SetVolumeLabelW
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
SetFileApisToOEM
Process32FirstW
OpenWaitableTimerW
LocalAlloc
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
CloseHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
RaiseException
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
DecodePointer
ExitProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
IsProcessorFeaturePresent
FlushFileBuffers
user32
GetCursorInfo
GetMenuInfo
GetMessageTime
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.5MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ