Static task
static1
Behavioral task
behavioral1
Sample
e2087d0098fcf705e2b9e4e5b4cfa583f63831bf793e2affc9a869bc78ccc7da.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2087d0098fcf705e2b9e4e5b4cfa583f63831bf793e2affc9a869bc78ccc7da.exe
Resource
win10v2004-20240226-en
General
-
Target
e2087d0098fcf705e2b9e4e5b4cfa583f63831bf793e2affc9a869bc78ccc7da
-
Size
885KB
-
MD5
e9b38639c6d1b672bdf35cb4a149bbbd
-
SHA1
20acf84f87e355ac141fff6f735c34e5cd60a701
-
SHA256
e2087d0098fcf705e2b9e4e5b4cfa583f63831bf793e2affc9a869bc78ccc7da
-
SHA512
56f7c26dc18b4f28d95b0745dcbd4d160952439346daacd9f041c8e23bb0331de7272f186885aca62fc4368424266bb2e6bbf288a77a9b1b6d5d2c3c5ff122aa
-
SSDEEP
12288:bdodtojezJsBrF651US8/A1W44JOjhjCLCOZyhhMN2rmDFs2Cn:bdstojezJq6GqW44U9sCOo/MNts
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2087d0098fcf705e2b9e4e5b4cfa583f63831bf793e2affc9a869bc78ccc7da
Files
-
e2087d0098fcf705e2b9e4e5b4cfa583f63831bf793e2affc9a869bc78ccc7da.exe windows:5 windows x86 arch:x86
94a15243b64f8836e8a90164f8331bb2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TrackPopupMenu
SetScrollRange
GetScrollRange
SetForegroundWindow
ShowScrollBar
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
GetScrollInfo
SetScrollInfo
CallWindowProcA
GetWindowPlacement
UnhookWindowsHookEx
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
WinHelpA
GetActiveWindow
GetDlgCtrlID
LoadIconA
GetCapture
LoadAcceleratorsA
SetActiveWindow
IsWindowVisible
IsIconic
InsertMenuItemA
GetClassInfoA
IntersectRect
SetRectEmpty
GetMenu
BringWindowToTop
SetMenu
ShowWindow
TranslateAcceleratorA
GetWindowTextLengthA
GetWindowTextA
GetScrollPos
SetScrollPos
GetWindow
SetFocus
ShowOwnedPopups
GetCursorPos
SetWindowPos
WindowFromPoint
ScreenToClient
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
GetMenuStringA
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
RegisterWindowMessageA
PostMessageA
GetClassNameA
GetDlgItem
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetKeyState
wsprintfA
SystemParametersInfoA
BlockInput
ExitWindowsEx
RegisterClassExA
GetFocus
ScrollWindow
MapWindowPoints
GetMessagePos
GetMessageTime
GetTopWindow
SendDlgItemMessageA
GetForegroundWindow
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
EnableWindow
UpdateWindow
ReleaseCapture
IsWindow
GetSysColor
RedrawWindow
ReleaseDC
PeekMessageA
InvalidateRect
SetWindowLongA
MessageBoxA
InflateRect
GetDC
PtInRect
SendMessageA
GetClientRect
MessageBeep
GetParent
SetCapture
PostQuitMessage
GetWindowRect
SetCursor
CopyRect
ModifyMenuA
DestroyIcon
InsertMenuA
GetSystemMetrics
RemoveMenu
GetMenuItemCount
AppendMenuA
GetSysColorBrush
CreatePopupMenu
GetMenuItemInfoA
GetDesktopWindow
TabbedTextOutA
GetMenuState
SetRect
DrawTextExA
DrawEdge
GrayStringA
CreateMenu
LoadBitmapA
DeleteMenu
DrawIconEx
GetSubMenu
DrawTextA
GetMenuItemID
FillRect
GetWindowLongA
OffsetRect
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
MoveWindow
DestroyCursor
LoadCursorA
SetCursorPos
IsRectEmpty
DrawIcon
SetWindowRgn
SetTimer
KillTimer
GetSystemMenu
SetParent
IsZoomed
UnregisterClassA
RemovePropA
GetPropA
SetPropA
GetClassLongA
IsChild
CharUpperA
CopyAcceleratorTableA
PostThreadMessageA
GetTabbedTextExtentA
GetDCEx
LockWindowUpdate
RegisterClipboardFormatA
kernel32
ExitProcess
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
HeapReAlloc
RtlUnwind
RaiseException
VirtualAlloc
ExitThread
FreeEnvironmentStringsW
HeapSize
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStringsW
QueryPerformanceCounter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetStringTypeA
GetStringTypeW
CreateFileW
GetUserDefaultLCID
SetThreadExecutionState
GetLastError
CreateMutexA
SetConsoleCtrlHandler
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetVersionExA
DeleteFileA
GetCurrentDirectoryA
CreateFileA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
DeviceIoControl
GetWindowsDirectoryA
GetSystemDirectoryA
Sleep
GetFullPathNameA
CreateThread
LocalFree
CreateNamedPipeA
WriteFile
ReadFile
FindResourceA
lstrlenA
LoadResource
WideCharToMultiByte
SizeofResource
lstrcatA
LockResource
WinExec
lstrcpyA
WaitForSingleObject
GetCPInfo
MultiByteToWideChar
lstrlenW
SetLastError
lstrcmpiA
GetVersion
FreeResource
GlobalLock
GlobalUnlock
GetCurrentProcessId
MulDiv
FormatMessageA
GlobalAlloc
GlobalFree
lstrcmpA
InterlockedExchange
CompareStringA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
GlobalAddAtomA
GlobalGetAtomNameA
SetThreadPriority
ResumeThread
SetEvent
SuspendThread
CreateEventA
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GetFileAttributesA
SetFileTime
GetFileTime
GetTempFileNameA
GetDiskFreeSpaceA
MoveFileA
GetStringTypeExA
GetThreadLocale
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FindClose
FindFirstFileA
GetVolumeInformationA
GetShortPathNameA
SetErrorMode
FileTimeToSystemTime
SystemTimeToFileTime
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleW
InterlockedIncrement
GlobalFlags
WritePrivateProfileStringA
GetOEMCP
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
GetTickCount
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
ReadConsoleInputA
SetConsoleMode
GetEnvironmentStrings
advapi32
RegDeleteKeyA
RegQueryValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
RegQueryValueExA
RegSetValueA
RegEnumKeyA
RegOpenKeyA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
SHGetFileInfoA
ExtractIconA
ShellExecuteA
gdi32
GetTextExtentPoint32A
SelectObject
CreateSolidBrush
ExtTextOutA
GetPixel
RectVisible
CreatePen
Escape
PtVisible
Ellipse
Rectangle
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SetPixel
CreateFontA
CreateDIBSection
DeleteDC
GetBkMode
PatBlt
GetTextExtentPoint32W
BitBlt
GetCurrentObject
CreateDCA
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetBkMode
CreateFontIndirectA
GetObjectA
GetStockObject
GetDeviceCaps
TextOutA
GetWindowOrgEx
GetTextExtentPointA
GetTextFaceA
GetTextAlign
GetTextColor
GetStretchBltMode
GetROP2
GetPolyFillMode
GetBkColor
GetNearestColor
CombineRgn
SetRectRgn
StretchDIBits
GetCharWidthA
GetTextMetricsA
LPtoDP
CreateEllipticRgn
EndDoc
AbortDoc
SetAbortProc
EndPage
StartPage
DPtoLP
GetViewportOrgEx
CreateRectRgnIndirect
CreatePatternBrush
GetCurrentPositionEx
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
StartDocA
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetStretchBltMode
SetROP2
SetPolyFillMode
comdlg32
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetJobA
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathRemoveFileSpecW
ole32
CoInitializeEx
CoUninitialize
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CoTaskMemFree
CoCreateInstance
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
oleacc
AccessibleObjectFromWindow
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 633KB - Virtual size: 633KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ