C b
Static task
static1
Behavioral task
behavioral1
Sample
e53b7f74cba1228b9f406c04e0ec580f4597d6de93cb5cdbf51564fee4111ead.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e53b7f74cba1228b9f406c04e0ec580f4597d6de93cb5cdbf51564fee4111ead.exe
Resource
win10v2004-20240226-en
General
-
Target
e53b7f74cba1228b9f406c04e0ec580f4597d6de93cb5cdbf51564fee4111ead
-
Size
74KB
-
MD5
5790ee7642277ac3ab4df17ba016754d
-
SHA1
f1d92a433e7fe4e17c349ebabad629e4fb814af3
-
SHA256
e53b7f74cba1228b9f406c04e0ec580f4597d6de93cb5cdbf51564fee4111ead
-
SHA512
e652a3b02827ee7afb794f596d756ff0845c7e67cbef674991a5f3d9ea4bd672bf0d0d12a00df3c6b894eebb3421e1ea8f69c497af2d416bfed8ef0ccd8cb385
-
SSDEEP
768:B33flOaKern+0UoJJNeFaTsBFWIw/Q1v0FFHOvFo0z4NbXCMH/SsN9+t+JYh/vXh:B3PlOPmnbeFh6Iw/Q1vaT0Kj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e53b7f74cba1228b9f406c04e0ec580f4597d6de93cb5cdbf51564fee4111ead
Files
-
e53b7f74cba1228b9f406c04e0ec580f4597d6de93cb5cdbf51564fee4111ead.exe windows:5 windows x86 arch:x86
4ca962fd475e46eae1935406bdb62435
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcsstr
srand
wcslen
_wfopen
fseek
ftell
fclose
strlen
mbstowcs
rand
memset
memcpy
wininet
InternetOpenUrlW
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetOpenW
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileW
shlwapi
StrCmpNW
PathMatchSpecW
PathFileExistsW
PathFindFileNameW
PathFileExistsA
kernel32
SetFileAttributesW
CopyFileW
lstrcmpiW
CreateDirectoryW
FindFirstFileW
lstrcmpW
ExitThread
FindNextFileW
FindClose
RemoveDirectoryW
GetLogicalDrives
GetDriveTypeW
QueryDosDeviceW
GetVolumeInformationW
GetModuleFileNameW
CreateProcessW
CreateThread
GetTickCount
CopyFileA
ExitProcess
GetLastError
CreateMutexA
MoveFileA
MoveFileW
DeleteFileA
GetModuleHandleA
MoveFileExW
ExpandEnvironmentStringsW
SetEndOfFile
SetFilePointer
CloseHandle
UnmapViewOfFile
HeapFree
HeapAlloc
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
DeleteFileW
Sleep
WriteFile
lstrcpyW
GetStartupInfoA
user32
ShowWindow
SetForegroundWindow
SetFocus
CloseWindow
wsprintfA
wsprintfW
FindWindowA
advapi32
CryptAcquireContextW
CryptEncrypt
CryptImportKey
CryptVerifySignatureA
CryptHashData
CryptCreateHash
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegSetValueExW
CryptDestroyKey
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ