Static task
static1
Behavioral task
behavioral1
Sample
e07e4647134101b36fab784992496c31.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e07e4647134101b36fab784992496c31.exe
Resource
win10v2004-20240226-en
General
-
Target
e07e4647134101b36fab784992496c31
-
Size
42KB
-
MD5
e07e4647134101b36fab784992496c31
-
SHA1
d8c99ac005e40da358bd6246c9cbd639a743aa8c
-
SHA256
42f320f5ea141ddc52f03c43dad82ac6e5f72e4ba74b8ae3b232d16eb68854d2
-
SHA512
9a3c9fec991cfdc283166faf2d431df4d6db1618b54fabcc3a2386850903aa01a8d64fe8648d0b333983bf7567df403eb0388af41c2f36f30ffac33e338ce5c5
-
SSDEEP
768:ttNXJ3uBS3TKIh8ncGyuga2q+I+Olk0UHYql0om9Bl58y57G0IyFcDxk:r/31KfcGjX2k+Olk4q+dH7Wx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e07e4647134101b36fab784992496c31
Files
-
e07e4647134101b36fab784992496c31.exe windows:4 windows x86 arch:x86
fdeef0d2845848c21a4fd96841faf0de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
ReadFile
OpenProcess
UnmapViewOfFile
MapViewOfFile
ReleaseMutex
WideCharToMultiByte
GetExitCodeProcess
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
LocalFree
Sleep
lstrlenW
lstrlenA
LocalAlloc
LoadLibraryA
GlobalMemoryStatus
GlobalFree
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempPathA
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetLogicalDrives
GetLocalTime
GetLastError
GetFileSize
GetDriveTypeA
GetDiskFreeSpaceA
GetComputerNameA
ExpandEnvironmentStringsA
CreateFileMappingA
CreateFileA
CloseHandle
CreateProcessA
lstrcpynA
user32
SetActiveWindow
mouse_event
SetCursorPos
GetCursorPos
wsprintfA
GetWindowRect
advapi32
GetUserNameA
RegQueryValueExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
shlwapi
StrStrIA
shell32
ShellExecuteA
wsock32
gethostname
gethostbyname
connect
closesocket
WSAStartup
socket
crypt32
CryptUnprotectData
Sections
Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nah Size: 265B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
19G8POW4 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ