Static task
static1
Behavioral task
behavioral1
Sample
e02c4ae80537ac655ee9b37661a63982.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e02c4ae80537ac655ee9b37661a63982.exe
Resource
win10v2004-20231215-en
General
-
Target
e02c4ae80537ac655ee9b37661a63982
-
Size
368KB
-
MD5
e02c4ae80537ac655ee9b37661a63982
-
SHA1
8696c17af8bf726fd49e644050e2cd45a92348ac
-
SHA256
75ea7bd5d0a23683e55f7ff6e18d276bc049c16659b352ce34dcf0e9d36c0661
-
SHA512
58fa4e169f36787f3e641c14f1a1557bc891f4a56ffd353640905d88417b2dfede5df874859dda76889b5b66c1934872cdfd2cbf6161aeb18de8d4f23c46d683
-
SSDEEP
6144:ACIkxATvd9UxTsG4yvdSfBHaN1IgLFvW53dW49l1TSUbPfLh3S5Z6K6lFKssP/bl:RIkxATvfUxgG4wdSJHaXhFvIgMlSUbPU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e02c4ae80537ac655ee9b37661a63982
Files
-
e02c4ae80537ac655ee9b37661a63982.exe windows:4 windows x86 arch:x86
42878372324bba1427544c0d937d2216
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GetCurrentThreadId
HeapAlloc
MultiByteToWideChar
FreeLibrary
DeleteFileA
WaitForSingleObject
HeapCreate
GetLocaleInfoA
GetCurrentProcess
GetModuleHandleA
GetVersion
GetLastError
GetTickCount
GetCurrentThread
GetCurrentProcessId
ExitProcess
GetProcessHeap
lstrlenA
GetCommandLineA
GetStartupInfoA
user32
GetWindow
GetParent
TranslateMessage
IsWindowVisible
GetClientRect
PostMessageA
PostQuitMessage
GetSysColor
PeekMessageA
msvcrt
_onexit
_strcmpi
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 348KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ