Static task
static1
Behavioral task
behavioral1
Sample
e1cc52252bc569a10fa04ec604e82dd4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e1cc52252bc569a10fa04ec604e82dd4.exe
Resource
win10v2004-20240226-en
General
-
Target
e1cc52252bc569a10fa04ec604e82dd4
-
Size
3.8MB
-
MD5
e1cc52252bc569a10fa04ec604e82dd4
-
SHA1
f7bfc7827b4a4dbba15b954c1b1d5fc9a92536d7
-
SHA256
bb15071fda420417ee6eba3b05be0ecd5c006dd24d435a1ab4163ce071796a91
-
SHA512
94b646caaed3b948d32389d0838bf3a6d9023c211bb493a32ec82ce44d49a3f3f29b380c74673a549c5b63e4f1c229f9b2a4a6a992b934e80bdb2b0ebb1537aa
-
SSDEEP
98304:EPXwz/C1pStx8SDGyNiLzOuusGdgo3JuWleZA:EPAzCvStjiyNQOOGdgo3beZA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1cc52252bc569a10fa04ec604e82dd4
Files
-
e1cc52252bc569a10fa04ec604e82dd4.exe windows:4 windows x86 arch:x86
b1bd2bd341928b34184332c0196aa466
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextExtentPointA
EnumFontsA
GetTextExtentExPointA
SetBitmapBits
SetViewportExtEx
GetWinMetaFileBits
GetObjectW
Escape
CreateFontA
GetWindowOrgEx
ws2_32
WSARecvFrom
WSASetServiceW
WSANtohs
getservbyname
WSAAddressToStringW
oleaut32
SafeArrayUnaccessData
SafeArrayGetElement
QueryPathOfRegTypeLi
LoadTypeLibEx
advapi32
CreateServiceA
DeregisterEventSource
CryptSetProvParam
CryptImportKey
CryptAcquireContextW
AddAccessAllowedAce
QueryServiceStatus
LogonUserW
CryptAcquireContextA
CloseServiceHandle
EnumServicesStatusA
SetNamedSecurityInfoA
SetSecurityDescriptorSacl
GetTokenInformation
CryptSetHashParam
RegConnectRegistryW
BuildTrusteeWithNameW
LookupPrivilegeDisplayNameA
user32
GetProcessWindowStation
SetPropA
GetMenuItemInfoW
ValidateRgn
kernel32
VirtualLock
SetLastError
LocalLock
GetFileInformationByHandle
ReleaseMutex
LocalFileTimeToFileTime
SetCurrentDirectoryA
GlobalFlags
DeleteFiber
UnmapViewOfFile
SuspendThread
OutputDebugStringA
GetCurrentProcess
TlsGetValue
DebugBreak
ExitProcess
TryEnterCriticalSection
GetDiskFreeSpaceW
RaiseException
GetNumberFormatW
EnumCalendarInfoA
GetCurrentDirectoryW
ReadFileScatter
GlobalReAlloc
GetStringTypeExW
CreateMutexW
VirtualFree
lstrcmpiA
SetThreadLocale
EraseTape
QueryDosDeviceA
SetProcessWorkingSetSize
LocalAlloc
IsBadWritePtr
GlobalAddAtomW
SystemTimeToFileTime
GetThreadContext
lstrcpynA
msvcrt
asctime
putc
_umask
_fullpath
isleadbyte
_fdopen
_endthreadex
fclose
wcscat
ferror
_wstrtime
getenv
getchar
atoi
frexp
rewind
fwprintf
perror
_mbstrlen
Sections
.text Size: 10KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ