Static task
static1
Behavioral task
behavioral1
Sample
e18e69fbac468dc4ea5ebedef2365fd0663b75da87962700b3a29a7db7b02e9a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e18e69fbac468dc4ea5ebedef2365fd0663b75da87962700b3a29a7db7b02e9a.exe
Resource
win10v2004-20231215-en
General
-
Target
e18e69fbac468dc4ea5ebedef2365fd0663b75da87962700b3a29a7db7b02e9a
-
Size
35KB
-
MD5
bb72640700cce22b557e3fb937749ef8
-
SHA1
90b4a9a9ded3935bc628bd05753906f646727522
-
SHA256
e18e69fbac468dc4ea5ebedef2365fd0663b75da87962700b3a29a7db7b02e9a
-
SHA512
b36701507d8019e6152dff768c9695ff0e608a1887676878c11a02852d12f5fbd5ac4b15d29a36f570abd95d3b940444fdafe839ac5960ece614426ab639ed5e
-
SSDEEP
384:9H81OokIrBE7B1GclMq09c1q+YZ2fnv92+XKsieqxcKBev/BpYcjj0o0K+:RC10XKczYZ2fvc7TBm/B/0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e18e69fbac468dc4ea5ebedef2365fd0663b75da87962700b3a29a7db7b02e9a
Files
-
e18e69fbac468dc4ea5ebedef2365fd0663b75da87962700b3a29a7db7b02e9a.exe windows:4 windows x64 arch:x64
60d6cd5ae11a4814b141c651179193fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateFileA
CreateFileMappingA
MapViewOfFile
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
VirtualAllocEx
WriteProcessMemory
LoadLibraryA
GetProcAddress
VirtualFreeEx
CreateRemoteThread
ReadProcessMemory
GetCurrentProcess
IsProcessorFeaturePresent
GetSystemInfo
msvcrt
strcmp
printf
memset
malloc
wcsstr
memmove
__set_app_type
_controlfp
__argc
__argv
_environ
__getmainargs
exit
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ