Static task
static1
Behavioral task
behavioral1
Sample
e07ae28b588315ba7ba5d2f1e15c1574.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e07ae28b588315ba7ba5d2f1e15c1574.exe
Resource
win10v2004-20240319-en
General
-
Target
e07ae28b588315ba7ba5d2f1e15c1574
-
Size
352KB
-
MD5
e07ae28b588315ba7ba5d2f1e15c1574
-
SHA1
d62acd27d3e0ddcd56128b5dc1e08e04d2bea5fc
-
SHA256
85c232d82d65460bc548442039a3532dad64de75b239e6f30df2f4fcdc299cd0
-
SHA512
39c6ef998e8a6898c1f61d835173da4a8bcb35910744b9bd8d507546fb24224585aa70a7ccef40d3586ecf7649c470d9a9f4ab620dcd4dc25c17967645212e70
-
SSDEEP
3072:iH6gfZhKwuDyxoBJKipJfoQwpxT35NWnZZSzyQnhxEQwthHGu+rMTvw0F5F2:8nKwuDyx6KUfNwpx35NgU9nipt2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e07ae28b588315ba7ba5d2f1e15c1574
Files
-
e07ae28b588315ba7ba5d2f1e15c1574.exe windows:4 windows x86 arch:x86
a066af72f4a91760c608062828ba2663
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
FindNextFileA
FindClose
GetACP
GetVersionExA
GetLocaleInfoA
SetFileAttributesA
GetTickCount
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCurrentProcess
GetComputerNameW
GetProcessHeap
FindFirstFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
QueryPerformanceCounter
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
RaiseException
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetComputerNameA
DeviceIoControl
FlushFileBuffers
SetEndOfFile
Sleep
CreateFileA
TerminateProcess
GetVersion
GetFileTime
GetSystemDirectoryA
ReadFile
GetFileSize
GetLastError
WriteFile
SetFilePointer
GetCurrentProcessId
DeleteFileA
SetFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
WaitForSingleObject
LeaveCriticalSection
CreateSemaphoreA
EnterCriticalSection
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
HeapCreate
HeapFree
HeapAlloc
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
user32
LoadStringA
wsprintfA
TranslateMessage
GetMessageA
GetKeyboardLayout
MapVirtualKeyExA
MapVirtualKeyA
wsprintfW
GetKeyNameTextA
EnumDisplaySettingsA
GetForegroundWindow
DispatchMessageA
advapi32
GetUserNameA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysAllocString
SysAllocStringLen
VariantInit
SysFreeString
Sections
.text Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ