Static task
static1
Behavioral task
behavioral1
Sample
e0a038560794577d9e5873e70f897059.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0a038560794577d9e5873e70f897059.exe
Resource
win10v2004-20231215-en
General
-
Target
e0a038560794577d9e5873e70f897059
-
Size
584KB
-
MD5
e0a038560794577d9e5873e70f897059
-
SHA1
17653f40e4233d9e410d4039a2aec78dae4ead45
-
SHA256
ae099df7a29fe1ac687ee73b45f627aac23e7d03341aeff2bbbabe747d5ac12e
-
SHA512
b7e919b7669bc490fc630e48f377bf4f676989776abf5281e9ad0e1486776abb360889e9be2511bc477e16db3dd4d10fb2e07a70b58f9b5f38652eef868e9cca
-
SSDEEP
12288:xaOvbI26VvxTSJB7BrsAF7jUZFpONu8w/kwCl3JFEZc:3OvxOJB7dEZ3Owf/IJEc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0a038560794577d9e5873e70f897059
Files
-
e0a038560794577d9e5873e70f897059.exe windows:5 windows x86 arch:x86
7a360f08814d9267b2033390edc45050
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
lstrlenA
lstrcpynW
FlushInstructionCache
GetCurrentProcess
LockResource
LoadResource
FindResourceW
MultiByteToWideChar
SizeofResource
LoadLibraryExW
GetModuleFileNameW
GetCommandLineW
OpenMutexW
CloseHandle
VirtualAlloc
VirtualFree
LCMapStringW
GetVersionExW
GetStringTypeW
GetStringTypeA
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
ExitProcess
Sleep
HeapReAlloc
FreeLibrary
LoadLibraryW
LCMapStringA
lstrcmpiW
GetProcAddress
InterlockedDecrement
RaiseException
InterlockedIncrement
GetLastError
lstrlenW
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
WriteFile
GetStdHandle
user32
DefWindowProcW
CharNextW
DestroyWindow
TranslateAcceleratorW
GetWindowRect
InvalidateRect
SendMessageW
CreateWindowExW
PeekMessageW
PtInRect
IsWindow
MessageBeep
TrackPopupMenuEx
SetWindowPos
CallWindowProcW
LoadStringA
PostQuitMessage
SetFocus
LoadStringW
SetMenuDefaultItem
SetMenuItemInfoW
ShowWindow
MapWindowPoints
GetClientRect
PostMessageW
SetWindowLongW
MonitorFromPoint
GetMonitorInfoW
GetMenuItemInfoW
RemoveMenu
GetMenuItemCount
AppendMenuW
DestroyMenu
CreatePopupMenu
GetWindowLongW
UnregisterClassA
gdi32
GetObjectW
GetStockObject
advapi32
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegDeleteKeyW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
comctl32
ImageList_LoadImageW
InitCommonControlsEx
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ