Static task
static1
Behavioral task
behavioral1
Sample
e0102ad34306781976a08f2d780b1150.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e0102ad34306781976a08f2d780b1150.exe
Resource
win10v2004-20240226-en
General
-
Target
e0102ad34306781976a08f2d780b1150
-
Size
515KB
-
MD5
e0102ad34306781976a08f2d780b1150
-
SHA1
bfe01960426cae63e1199f7ddc53e455c28985d0
-
SHA256
e18583993ae368d11d6f546903beda1c0980191ab4e4c36b23d13b19589d9e40
-
SHA512
3142db703597a3917f2471aefc16879b0af76429d161b8bd1128c134f7152fa42e65e6a951af82c9dd3fa17dfee1643ae3e2ff6e8744023d89f419be564830a4
-
SSDEEP
12288:3+h5cTV27Vz1KLwx4+Hpw5Seq5N9F7ymHnmjae1qhicfi:3+h5ckl1KMx4+Jwlq5NNmj/Ygcfi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0102ad34306781976a08f2d780b1150
Files
-
e0102ad34306781976a08f2d780b1150.exe windows:4 windows x86 arch:x86
014408c1833e94c454ca75856b145e4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
RetrieveUrlCacheEntryFileW
GopherFindFirstFileW
DeleteUrlCacheGroup
InternetGetLastResponseInfoA
comctl32
InitCommonControlsEx
kernel32
HeapDestroy
CloseHandle
DeleteCriticalSection
GetCurrentProcessId
HeapCreate
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
TlsGetValue
GetCurrentProcess
SetFileAttributesA
GetTimeZoneInformation
GetLastError
GetStringTypeW
LoadLibraryA
GetConsoleCursorInfo
GetCPInfo
GetTempPathA
WriteFile
GetModuleFileNameA
RtlUnwind
MultiByteToWideChar
GetLocalTime
QueryPerformanceCounter
InterlockedExchange
HeapFree
CompareFileTime
SuspendThread
HeapAlloc
EnterCriticalSection
TlsAlloc
VirtualFree
WritePrivateProfileSectionA
SetLastError
TlsSetValue
InterlockedIncrement
GetModuleFileNameW
CompareStringA
SetFilePointer
HeapReAlloc
ReadFile
VirtualQuery
TerminateProcess
GetStdHandle
OpenFileMappingW
GetTempFileNameA
ExitProcess
GetStartupInfoA
GetTempFileNameW
GetProcAddress
GetStartupInfoW
ReadConsoleOutputW
GetCommandLineW
WideCharToMultiByte
GetModuleHandleA
SetConsoleTitleW
lstrcpyW
FreeEnvironmentStringsW
LCMapStringA
GetSystemTime
LeaveCriticalSection
GetCommandLineA
OpenMutexA
GetEnvironmentStringsW
GetProfileSectionW
SetEnvironmentVariableA
CreateNamedPipeA
UnhandledExceptionFilter
IsBadWritePtr
GetCurrencyFormatA
GetVersion
GetDiskFreeSpaceExW
GetCurrentThreadId
TlsFree
VirtualAlloc
CompareStringW
GetStringTypeA
InterlockedDecrement
GetEnvironmentStrings
SetHandleCount
lstrlenA
GetFileType
CreateMutexA
GetCurrentThread
LCMapStringW
GetTickCount
SetStdHandle
VirtualProtectEx
FlushFileBuffers
SetConsoleCtrlHandler
FillConsoleOutputCharacterA
InitializeCriticalSection
advapi32
RegRestoreKeyA
CryptDestroyKey
RegConnectRegistryW
CryptDuplicateHash
RevertToSelf
RegConnectRegistryA
RegDeleteKeyA
DuplicateTokenEx
LookupPrivilegeNameA
RegOpenKeyExW
LookupAccountNameW
CryptImportKey
RegQueryMultipleValuesW
RegSetValueExA
CryptGetHashParam
CryptAcquireContextA
CryptSetProviderW
CryptDestroyHash
CryptAcquireContextW
RegCreateKeyA
CryptEnumProvidersW
CryptDecrypt
AbortSystemShutdownA
user32
SetRectEmpty
CloseWindowStation
RegisterClassExA
BringWindowToTop
RegisterClassA
GetWindowThreadProcessId
InsertMenuA
CharNextExA
DdeQueryConvInfo
GetCaretBlinkTime
Sections
.text Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ