Static task
static1
Behavioral task
behavioral1
Sample
ec823b598ae74558bf4b477d7db762ff8f63bb418c0f049f1a171786774c1dfa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec823b598ae74558bf4b477d7db762ff8f63bb418c0f049f1a171786774c1dfa.exe
Resource
win10v2004-20240226-en
General
-
Target
ec823b598ae74558bf4b477d7db762ff8f63bb418c0f049f1a171786774c1dfa
-
Size
312KB
-
MD5
d29a04a2277eda6d1a6382797974302b
-
SHA1
a95df06d2fd958f7a11c467d96060238e7b542a7
-
SHA256
ec823b598ae74558bf4b477d7db762ff8f63bb418c0f049f1a171786774c1dfa
-
SHA512
be21896c2a01d8b4df6cc1a6fa3231fe97f00b32aacb6b232c0613ff12bc283fbc6e63eb8c3e82d3ac4bf7fa012c634be48ce709e8c077cbaa7653ff4e06d71d
-
SSDEEP
6144:F0gkc2A3dPGhg2mnR8rBLzw5bxrJhhCxlW:Dkc2A3dOa2C8rBHAbF7hgl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec823b598ae74558bf4b477d7db762ff8f63bb418c0f049f1a171786774c1dfa
Files
-
ec823b598ae74558bf4b477d7db762ff8f63bb418c0f049f1a171786774c1dfa.exe windows:5 windows x86 arch:x86
3be88ab49aaf585748f8a6da6141b9cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
ReadConsoleA
GetConsoleAliasA
GetFileAttributesExA
GetTickCount
GetCommConfig
EnumTimeFormatsW
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
FreeConsole
GetConsoleAliasExesLengthW
EnumSystemCodePagesA
WriteConsoleW
MultiByteToWideChar
FindNextVolumeMountPointW
CreateDirectoryA
GetLastError
GetProcAddress
PeekConsoleInputW
GetExitCodeThread
GetNumberFormatW
RemoveDirectoryW
QueryDosDeviceW
InterlockedIncrement
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
ReadConsoleOutputCharacterW
GetVolumeInformationW
CloseHandle
CreateFileW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
HeapReAlloc
GetOEMCP
IsValidCodePage
GetACP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLocaleInfoA
CreateFileA
FindResourceA
FoldStringW
GetEnvironmentVariableW
GetSystemTimeAsFileTime
QueryPerformanceCounter
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetStringTypeW
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
RtlUnwind
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetProcessHeap
IsDebuggerPresent
GetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
GetCurrentThreadId
user32
GetKeyboardLayoutNameA
CharUpperBuffW
GetKeyNameTextA
ChangeDisplaySettingsW
ChangeMenuA
GetWindowTextLengthA
DrawEdge
GetClassInfoW
CreateWindowStationA
CharLowerA
SetUserObjectSecurity
GetAltTabInfoW
DdeQueryStringA
CloseWindow
gdi32
CreateCompatibleBitmap
CreateDCA
advapi32
ReadEventLogA
winhttp
WinHttpOpen
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 41.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ