Static task
static1
Behavioral task
behavioral1
Sample
cea8687dd6fda4b143e019992197a755.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cea8687dd6fda4b143e019992197a755.exe
Resource
win10v2004-20240226-en
General
-
Target
cea8687dd6fda4b143e019992197a755.exe
-
Size
191KB
-
MD5
cea8687dd6fda4b143e019992197a755
-
SHA1
296db37279807f718252f1ff6bb1396e0161555b
-
SHA256
632352c2270d6139e440590aeb73c1e9199f2fd735441f137e2ea8feb0357368
-
SHA512
3a10615e536167c73bcd343de671cbd0ed8b08985d7abf6d69ccb8d9461d532503e745fec27ad6d6a3787a9c4713e2d4cd6dc44c4bff062d346a7adb40bac718
-
SSDEEP
3072:AIG3LX2TuEcamaUDY95KM7Pm/3BBo/Byxs6JLC5oR6ffezl3HuKxPz194U5JDDZz:ANTfEcfvDs7u/xBuwPxjRvFvHJDdHpgc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cea8687dd6fda4b143e019992197a755.exe
Files
-
cea8687dd6fda4b143e019992197a755.exe.exe windows:6 windows x86 arch:x86
a06fc7968855e5fcccb24dae5b638c7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
FlushFileBuffers
HeapSize
SetStdHandle
GetConsoleMode
GetShortPathNameW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
DecodePointer
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
CreateThread
CreateSemaphoreW
CreateEventW
WaitForSingleObject
GetLastError
CloseHandle
GetACP
IsValidCodePage
GetStringTypeW
HeapReAlloc
FreeEnvironmentStringsW
GetFileAttributesW
LCMapStringW
VirtualProtect
HeapFree
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
QueryPerformanceCounter
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
SetFilePointerEx
GetSystemTimeAsFileTime
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCPInfo
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetFileType
WriteConsoleW
user32
LoadStringA
DefWindowProcW
GetFocus
CreateMenu
CreatePopupMenu
InsertMenuW
AppendMenuW
GetForegroundWindow
GetDC
ReleaseDC
GetClientRect
MessageBoxW
CreateIconIndirect
GetDesktopWindow
FillRect
gdi32
MoveToEx
ExtCreatePen
StrokePath
SelectObject
PtInRegion
LineTo
GetStockObject
GetDCPenColor
DeleteObject
CreateRectRgn
CreatePatternBrush
CreateFontIndirectW
CreateBitmap
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
dinput8
DirectInput8Create
Sections
.text Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ