Static task
static1
Behavioral task
behavioral1
Sample
ea00ed35a80a86f21caf6cccfe39be00499cb8c7685ad51ce9f313457d072028.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea00ed35a80a86f21caf6cccfe39be00499cb8c7685ad51ce9f313457d072028.exe
Resource
win10v2004-20231215-en
General
-
Target
ea00ed35a80a86f21caf6cccfe39be00499cb8c7685ad51ce9f313457d072028
-
Size
3.7MB
-
MD5
9bd93bf6390417846fa1200024511063
-
SHA1
f6f16a06a56a134d95332bfffada036ffd788164
-
SHA256
ea00ed35a80a86f21caf6cccfe39be00499cb8c7685ad51ce9f313457d072028
-
SHA512
bff251e973ff2eb6026ac0e8a9923415ec0b4124872a9ce2f0a53f77b0ea8908bd3b739310565ac372e5ad2137d22467845515c8845ea08db0bb6aeb26c1d06a
-
SSDEEP
98304:WGst199WR/FtuNnORFjU0fVT3ThGrIpcnIfQifbtZ2Zm0HwXsI:5st1GctORq0tbTiIpcnCQOtZ2H25
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea00ed35a80a86f21caf6cccfe39be00499cb8c7685ad51ce9f313457d072028
Files
-
ea00ed35a80a86f21caf6cccfe39be00499cb8c7685ad51ce9f313457d072028.exe windows:4 windows x86 arch:x86
e427c9ce818a9a6c908ad7455a4402c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetFullPathNameA
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
GetTimeZoneInformation
GetACP
HeapSize
HeapReAlloc
TerminateProcess
GetEnvironmentVariableA
FlushFileBuffers
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetDriveTypeA
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
ReadFile
GetCurrentProcess
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetProcessVersion
GetCurrentThreadId
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
GetVersion
GlobalFlags
GlobalFree
lstrcmpA
lstrcmpiA
lstrcpynA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalLock
GlobalUnlock
GetModuleHandleA
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
FindNextFileA
lstrcpyA
SetLastError
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
GetTempPathA
GetTempFileNameA
FindResourceA
SizeofResource
LoadResource
CreateFileA
LockResource
WriteFile
CloseHandle
GetModuleFileNameA
WaitForSingleObject
CreateDirectoryA
GetLastError
MultiByteToWideChar
FindFirstFileA
FindClose
DeleteFileA
GetVersionExA
RemoveDirectoryA
user32
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
PostMessageA
LoadIconA
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
PostQuitMessage
DestroyMenu
GetSubMenu
GetMenuItemID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSysColor
GetSysColorBrush
LoadCursorA
GetSystemMetrics
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
MessageBoxA
SetFocus
EnableWindow
IsWindowEnabled
SetWindowLongA
GetDlgItem
UnhookWindowsHookEx
GetFocus
GetParent
SendMessageA
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
PtInRect
GetWindowLongA
GetClassNameA
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
CreateWindowExA
ShowWindow
GetWindowDC
GetWindowRect
GetActiveWindow
SetWindowPos
GetDC
LoadBitmapA
ReleaseDC
DestroyWindow
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetTextColor
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
CreateCompatibleDC
SelectObject
GetObjectA
CreateFontA
SetBkMode
SetBkColor
GetStockObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
ShellExecuteExA
comctl32
ord17
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ruskkew Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE