Static task
static1
Behavioral task
behavioral1
Sample
e2387f04aa543062ac274314dc224552.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2387f04aa543062ac274314dc224552.exe
Resource
win10v2004-20240226-en
General
-
Target
e2387f04aa543062ac274314dc224552
-
Size
12KB
-
MD5
e2387f04aa543062ac274314dc224552
-
SHA1
59eeacb66a2fb946eebda822da1239d0f0db0033
-
SHA256
679a57d54b8d2f48c1ba04bf834ce9ac74b9b20e7d91f7b035e636fcaf0e6cc6
-
SHA512
643a0e9cc1ade9793ed90c27b02ad3bed6fddc8ea06eeee066d09ee31cd600a1bec3fd55418decbe2777f54eaaf16e76f39ffdcc5a6bea67cf8cff36390ff0e8
-
SSDEEP
192:p59h1vUlOS+1StGRA1ovwhbHic0StfGG:pHh1vUlyc0CfG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2387f04aa543062ac274314dc224552
Files
-
e2387f04aa543062ac274314dc224552.exe windows:1 windows x86 arch:x86
61263f5514acf64ef875593dbd72488b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetComputerNameA
GetCurrentProcessId
GetFileSize
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
MoveFileA
OpenProcess
Process32First
Process32Next
ReadFile
RtlZeroMemory
SetErrorMode
SetFilePointer
Sleep
TerminateProcess
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
user32
EnumWindows
GetWindowTextA
IsWindowVisible
MessageBoxA
SendMessageA
SetWindowTextA
ShowWindow
wsprintfA
advapi32
GetUserNameA
RegCloseKey
RegCreateKeyA
RegSetValueExA
shell32
SHGetFolderPathA
ShellExecuteA
shlwapi
StrToIntA
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
socket
Sections
.data Size: 6KB - Virtual size: 984KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE