Static task
static1
Behavioral task
behavioral1
Sample
File-Euphoria.VN_784614.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
File-Euphoria.VN_784614.exe
Resource
win10v2004-20231215-en
General
-
Target
File-Euphoria.VN_784614.exe
-
Size
8.8MB
-
MD5
f488ea218231bae717e5cfd9fdaa26b7
-
SHA1
f9698da92192556ed6d694354f1a490ff690ebce
-
SHA256
003e1ab501ddf004c38fb5e59bc5bf46fbc0ace44de6afce3455ad60a1fa1a59
-
SHA512
04bdb07039ca1aaed8bac5d435065f52d0b62c52dbc4db86c6835977b0637e35cd421ac80cd083dd9b728f2626b41c832094cf26f39849a5abdf8744249bd8d6
-
SSDEEP
196608:E/y4mp6lBo5/aGu03iYVUwJeekHCB8G4ulgpujV5C8rphiEzG:OYPu03dSwJiCB8LuyeS8loEa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource File-Euphoria.VN_784614.exe
Files
-
File-Euphoria.VN_784614.exe.exe windows:6 windows x86 arch:x86
ace20a751910b10ef6c3150601349824
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
PathCombineW
kernel32
EnumSystemLocalesW
LCMapStringEx
InitializeCriticalSectionEx
SetFilePointer
CreateThread
FindFirstFileA
GetFileAttributesW
RaiseException
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetCurrentDirectoryA
CreateDirectoryA
GetSystemTimeAsFileTime
HeapAlloc
GetSystemWow64DirectoryW
Sleep
GetConsoleMode
ExitProcess
DecodePointer
CreateDirectoryW
GetLastError
GetCommandLineA
InitializeSListHead
GetTickCount64
SetFileTime
TlsGetValue
GetFileInformationByHandle
SetLastError
SetEvent
GetCurrentDirectoryW
SetFileAttributesA
FindClose
HeapFree
LocalFree
GetCurrentProcess
CreateEventA
DeleteFileA
DeleteFileW
GetProcessHeap
GetEnvironmentStringsW
TlsFree
GetCommandLineW
RtlUnwind
LoadLibraryW
GetNativeSystemInfo
GetOEMCP
FreeEnvironmentStringsW
DeleteCriticalSection
VirtualProtect
GetSystemInfo
SetFileAttributesW
UnhandledExceptionFilter
GetCurrentProcessId
GetStringTypeW
AreFileApisANSI
FindFirstFileExW
VirtualFree
FindNextFileA
GetUserDefaultLCID
HeapSize
RemoveDirectoryA
FlushFileBuffers
FreeLibrary
GetTempPathA
GetProcessAffinityMask
GetACP
RemoveDirectoryW
FormatMessageA
GlobalMemoryStatus
FreeLibraryAndExitThread
SetStdHandle
MultiByteToWideChar
WriteConsoleW
GetFileSize
GetFileAttributesA
IsValidLocale
CreateFileA
VirtualAlloc
QueryPerformanceCounter
WideCharToMultiByte
GetConsoleOutputCP
EnterCriticalSection
GetVersionExA
SetUnhandledExceptionFilter
TlsAlloc
GetLocaleInfoW
SetEndOfFile
CloseHandle
LoadLibraryExW
ExitThread
GetProcAddress
lstrlenW
CreateSemaphoreA
WriteFile
GetStdHandle
FindFirstFileW
GetTempPathW
GetStartupInfoW
FormatMessageW
GetSystemDirectoryW
GetModuleHandleExW
GetTickCount
WaitForSingleObject
IsBadReadPtr
IsDebuggerPresent
GetModuleFileNameW
CreateFileW
InitializeCriticalSection
GetFileType
HeapReAlloc
IsProcessorFeaturePresent
LeaveCriticalSection
ReadFile
LoadLibraryA
GetModuleFileNameA
FindNextFileW
ReleaseSemaphore
EncodePointer
SetFilePointerEx
TlsSetValue
LCMapStringW
TerminateProcess
GetModuleHandleA
IsValidCodePage
ResetEvent
GetCurrentThreadId
lstrcatW
user32
LoadStringA
DialogBoxParamW
SendMessageA
PostMessageA
SetWindowTextW
DestroyWindow
CharUpperA
EndDialog
GetDlgItem
GetWindowLongA
LoadIconA
MessageBoxW
DialogBoxParamA
ShowWindow
CharUpperW
LoadStringW
SetWindowTextA
SetWindowLongA
KillTimer
SetTimer
shell32
SHGetSpecialFolderPathW
oleaut32
SysAllocStringLen
SysStringLen
VariantClear
advapi32
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
ole32
CoInitialize
CoCreateInstance
CoUninitialize
Sections
.text Size: 937KB - Virtual size: 937KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.2MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ