Static task
static1
Behavioral task
behavioral1
Sample
e0a53cf1462ebfc9572a90032439bfbc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0a53cf1462ebfc9572a90032439bfbc.exe
Resource
win10v2004-20240226-en
General
-
Target
e0a53cf1462ebfc9572a90032439bfbc
-
Size
124KB
-
MD5
e0a53cf1462ebfc9572a90032439bfbc
-
SHA1
2b0630124724f16ecc3ce2b8ff1c5467e8cae19e
-
SHA256
78c255a181b17986d7addf69bad686a492db1eea6c3f032a511de3430f726a41
-
SHA512
ba5e7573617c84c1434ffd67513315b3d5ad48ed919744c59964bcafc8af52e86379f8bda9158ed27156755273d160866525a1d179b3bfebceaec33f4567531e
-
SSDEEP
3072:y3VnSj+aOlBMuCw0O9VY4umguYpW61H/yiCmi2Rvzff:yFnSj+aOHMuCuhgLlH6zmi2tzH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0a53cf1462ebfc9572a90032439bfbc
Files
-
e0a53cf1462ebfc9572a90032439bfbc.exe windows:4 windows x86 arch:x86
ca5af435677f0188b18c47d7ef51502f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
lstrcatA
GetSystemDirectoryA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrcmpiA
GetModuleFileNameA
ReadProcessMemory
GetThreadContext
CreateProcessA
ExitProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
DeleteFileA
MoveFileA
FreeResource
lstrlenA
WriteFile
SizeofResource
SetFileTime
LocalFileTimeToFileTime
FindFirstFileA
CreateFileA
LoadResource
FindResourceA
GetTickCount
GetTempPathA
SetLastError
GetWindowsDirectoryA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
ReadFile
SetFilePointer
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GetFileAttributesA
SetUnhandledExceptionFilter
ReleaseMutex
GetCommandLineA
Sleep
CreateThread
WinExec
GetCurrentThreadId
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
msvcrt
??3@YAXPAX@Z
realloc
malloc
rand
strchr
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strcmpi
memset
strlen
__CxxFrameHandler
_except_handler3
memcpy
??2@YAPAXI@Z
ntdll
ZwUnmapViewOfSection
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ