Static task
static1
Behavioral task
behavioral1
Sample
e05539d98d38c0fe7d24435efc7db3ce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e05539d98d38c0fe7d24435efc7db3ce.exe
Resource
win10v2004-20240226-en
General
-
Target
e05539d98d38c0fe7d24435efc7db3ce
-
Size
233KB
-
MD5
e05539d98d38c0fe7d24435efc7db3ce
-
SHA1
08d105123d4374d9762a1a9d36145f97aca6f41e
-
SHA256
f8deb698d755da09bf8792161da49eb927d1bb518f49031e48d29aef0362407b
-
SHA512
f5324c42e0a0fed5f37e11149e540dd081f39734e243c86cbc4bbb8848dac9a48f5cdac81215a4c950d2f728b05b2dc05bc5c843aa79bc40110e9ad6d0907446
-
SSDEEP
6144:zpXWsy+IRwI6qE1MztI9nCtrw5+jHtEmg:wMGE1Mzhlqmg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e05539d98d38c0fe7d24435efc7db3ce
Files
-
e05539d98d38c0fe7d24435efc7db3ce.exe windows:4 windows x86 arch:x86
08b31acb1e91587b9cdedb19c0fa949f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CloseHandle
CreateFileA
GetModuleFileNameA
Sleep
CreateThread
SetLastError
GetLastError
TerminateProcess
OpenProcess
ReadFile
GetFileSize
WriteFile
SetFilePointer
SetFileAttributesA
GetLocalTime
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetThreadContext
CreateProcessA
GetCurrentDirectoryA
GetWindowsDirectoryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
DeleteFileA
CopyFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetProcessVersion
lstrcmpiA
WideCharToMultiByte
MultiByteToWideChar
user32
MessageBoxA
msvcrt
wcscpy
__dllonexit
??2@YAPAXI@Z
strlen
strcat
memset
strcpy
memcpy
??3@YAXPAX@Z
ftell
fclose
fread
fseek
fopen
__CxxFrameHandler
wcslen
_onexit
fwrite
time
_itoa
_wcsicmp
_strnicmp
_wcsnicmp
??0exception@@QAE@ABV0@@Z
_EH_prolog
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memmove
??1type_info@@UAE@XZ
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ