Static task
static1
Behavioral task
behavioral1
Sample
e41343174c3e683aed7ef20e4852198c4d43cf707273e29b067f867cba4d5724.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e41343174c3e683aed7ef20e4852198c4d43cf707273e29b067f867cba4d5724.exe
Resource
win10v2004-20240226-en
General
-
Target
e41343174c3e683aed7ef20e4852198c4d43cf707273e29b067f867cba4d5724
-
Size
459KB
-
MD5
1ad05da825925d88ffe85e3123e0b3ec
-
SHA1
0ff75a17d9a8eb8f1247389c2f73697b76aa4770
-
SHA256
e41343174c3e683aed7ef20e4852198c4d43cf707273e29b067f867cba4d5724
-
SHA512
b0aee42d49da5e6a0e14097a4580026d2d929674bf6b1ada46f76819fb1f27f14f7df9468565eda1b636688bfb89ecb3bcfc51875e2ce194eef833a5afb93d43
-
SSDEEP
6144:eVUv/CSLQbu0jUu5BwXRsAMJqkj37emhPcREXTIFQ7NS9rbtSQhKO7kzW4:0U/C1bdZXAlQEyXqkNS9rhzbkzW4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e41343174c3e683aed7ef20e4852198c4d43cf707273e29b067f867cba4d5724
Files
-
e41343174c3e683aed7ef20e4852198c4d43cf707273e29b067f867cba4d5724.exe windows:4 windows x86 arch:x86
7b04ecdcc5019f6daaef5a5f35122b98
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetACP
VirtualAlloc
GetCurrentThread
GetOEMCP
GetStartupInfoA
ReleaseMutex
CreateFileMappingW
HeapFree
UnmapViewOfFile
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
SetEvent
WaitForSingleObject
TerminateThread
GetExitCodeThread
GetExitCodeProcess
CloseHandle
CreateProcessW
Sleep
GetVersionExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetProcessHeap
HeapAlloc
OpenFileMappingW
OpenEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetCommandLineW
GetSystemDirectoryW
LoadLibraryA
MapViewOfFile
lstrcpyW
GetLastError
LoadLibraryW
DeleteCriticalSection
LeaveCriticalSection
user32
LoadCursorA
LoadCursorW
GetWindowRect
LoadStringW
GetSysColorBrush
RegisterClassW
InvalidateRgn
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
UnregisterClassW
GetDesktopWindow
GetWindowLongW
EnableWindow
DialogBoxParamW
IsWindow
GetParent
GetDlgItem
EndDialog
LoadIconW
SendDlgItemMessageW
MessageBoxW
PostMessageW
SetWindowLongW
SystemParametersInfoW
GetDC
ReleaseDC
SendMessageW
EnumWindows
GetSystemMetrics
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameW
SetWindowPos
msvcrt
_controlfp
__dllonexit
_onexit
__p__fmode
__p__commode
fopen
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
wcstok
swprintf
srand
_wcsnicmp
wcsncat
wcslen
wcsncpy
fclose
fflush
_vsnprintf
fputs
vfprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_c_exit
exit
_wcsicmp
advapi32
RegOpenKeyA
Sections
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata51 Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg22 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata52 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ