Static task
static1
Behavioral task
behavioral1
Sample
e2093eddd4b7fbb95ac7dd7ae487a3eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2093eddd4b7fbb95ac7dd7ae487a3eb.exe
Resource
win10v2004-20240226-en
General
-
Target
e2093eddd4b7fbb95ac7dd7ae487a3eb
-
Size
28KB
-
MD5
e2093eddd4b7fbb95ac7dd7ae487a3eb
-
SHA1
f2e90b7a94efb16bbfd390a31f4a10c50408df36
-
SHA256
4a2831711024081d4f431d8f37de62ad8500891cced60409eb6f0b3e61e82303
-
SHA512
19f199ba2de5d186b94045b8d10629d184d2afdd391d9c9bc5204f7877dac99fd5f0700e819c69b4c19b9fe9a05415403ed627dbd84ae8a44257453aa3771289
-
SSDEEP
384:DZzZuuuA7xmmUDT/cy/25tISE1x9O7PhIQY0wB3qHFiK7v/s6bf:VNcABUDTkt5iSE1x9OGQYjcFTLs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2093eddd4b7fbb95ac7dd7ae487a3eb
Files
-
e2093eddd4b7fbb95ac7dd7ae487a3eb.exe windows:5 windows x86 arch:x86
5c4aa7fb37569307936f0f0b6e3551fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
LocalAlloc
LocalFree
CreateFileA
GetFileSize
lstrlenA
WriteFile
GetProcAddress
CloseHandle
ExitProcess
MoveFileExA
GetCurrentProcess
Sleep
CreateEventA
GetComputerNameExA
TerminateProcess
GetSystemDirectoryA
lstrcatA
lstrlenW
LoadLibraryA
OpenEventA
GetModuleFileNameA
lstrcpyA
shlwapi
StrToIntA
ole32
StringFromCLSID
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE