Static task
static1
Behavioral task
behavioral1
Sample
e047c19cbf055d83c32c402401532605.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e047c19cbf055d83c32c402401532605.exe
Resource
win10v2004-20231215-en
General
-
Target
e047c19cbf055d83c32c402401532605
-
Size
428KB
-
MD5
e047c19cbf055d83c32c402401532605
-
SHA1
66f80879ad4a6511409c7ad6c23575239b76692f
-
SHA256
e77f088334905265e1a17362dd1941eadfb349b74579c44eef583d04ad418d07
-
SHA512
ff23c0d075241699107c61c9e8b5de62bd6b7197ed83cd8d1ac1868bb4684430a57657a918b83044b42626e5aa19f0d5e047fe9de4e7813ee06c03aab49e5abb
-
SSDEEP
12288:XukpgB+wKQj38+hV+/AT4LMcYhyI7IcuC/cH3YVS2usJenCHt2ng:XBQzPTH5gI0tU6og8aQ2ng
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e047c19cbf055d83c32c402401532605
Files
-
e047c19cbf055d83c32c402401532605.exe windows:4 windows x86 arch:x86
0288a4cba43572ee9d97d3c4caf9be81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClassWord
EnumClipboardFormats
RedrawWindow
GetNextDlgGroupItem
LoadCursorFromFileA
CheckMenuItem
SetMenuInfo
UnregisterHotKey
DdeQueryConvInfo
SetMenuDefaultItem
GetUserObjectInformationW
IsClipboardFormatAvailable
DragObject
LookupIconIdFromDirectory
IsZoomed
SetCaretBlinkTime
TrackMouseEvent
PeekMessageA
WaitMessage
SendIMEMessageExA
comdlg32
GetFileTitleW
PageSetupDlgA
LoadAlterBitmap
GetOpenFileNameW
GetSaveFileNameW
GetSaveFileNameA
GetFileTitleA
ChooseColorA
ReplaceTextW
ReplaceTextA
ChooseFontA
FindTextA
ChooseColorW
PrintDlgA
ChooseFontW
GetOpenFileNameA
FindTextW
PrintDlgW
wininet
GetUrlCacheHeaderData
SetUrlCacheGroupAttributeW
InternetOpenW
InternetCheckConnectionW
FtpCreateDirectoryA
FindNextUrlCacheEntryA
InternetWriteFile
InternetSecurityProtocolToStringW
InternetReadFile
InternetGoOnlineA
InternetReadFileExA
GopherFindFirstFileW
GopherCreateLocatorA
FindFirstUrlCacheEntryExW
InternetConnectW
CommitUrlCacheEntryA
FtpDeleteFileA
shell32
RealShellExecuteA
SHAppBarMessage
SHGetFileInfo
ShellHookProc
SheChangeDirExW
SHQueryRecycleBinW
SHFreeNameMappings
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
DoEnvironmentSubstA
ShellExecuteExW
SHAddToRecentDocs
kernel32
WideCharToMultiByte
GetCommandLineA
GetCommandLineW
GetSystemTimeAsFileTime
GlobalDeleteAtom
IsValidCodePage
IsValidLocale
GetEnvironmentStringsW
GetLocaleInfoA
GetCurrentThreadId
FreeEnvironmentStringsW
SetHandleCount
TlsSetValue
ExitProcess
HeapCreate
HeapDestroy
InterlockedIncrement
GetStringTypeA
CompareStringA
TlsFree
GetCurrentThread
GetStringTypeW
GetDateFormatA
WriteFile
WritePrivateProfileStringW
FreeEnvironmentStringsA
CompareStringW
DeleteCriticalSection
SetEnvironmentVariableA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EnumSystemLocalesA
SetConsoleCtrlHandler
MultiByteToWideChar
InterlockedExchange
LCMapStringA
HeapSize
TerminateProcess
GetModuleFileNameA
SetLastError
GetModuleHandleA
GetModuleFileNameW
GetStartupInfoA
HeapFree
GlobalUnlock
FindClose
VirtualQuery
InitializeCriticalSection
GetOEMCP
GetProcessHeap
GetLocaleInfoW
EnterCriticalSection
InterlockedDecrement
GetLastError
TlsGetValue
FreeLibrary
TlsAlloc
GetProcAddress
GetTimeZoneInformation
VirtualFree
RtlUnwind
GetStdHandle
WriteProfileStringW
GetEnvironmentStrings
GlobalReAlloc
LoadLibraryA
GetStartupInfoW
GetTickCount
QueryPerformanceCounter
GetUserDefaultLCID
GetVersionExA
LCMapStringW
HeapReAlloc
GetFileType
GetCurrentProcess
LeaveCriticalSection
Sleep
GetTimeFormatA
HeapValidate
GetCurrentProcessId
HeapAlloc
GetACP
VirtualAlloc
GetCPInfo
GetPrivateProfileStructA
IsDebuggerPresent
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 276KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ