Static task
static1
Behavioral task
behavioral1
Sample
ea6db186005eb24ffeb379729fa34d77.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ea6db186005eb24ffeb379729fa34d77.exe
Resource
win10v2004-20231215-en
General
-
Target
ea6db186005eb24ffeb379729fa34d77
-
Size
463KB
-
MD5
ea6db186005eb24ffeb379729fa34d77
-
SHA1
83bec0e8c739164a90a96ee513669d0b930619bd
-
SHA256
f5f9e3e9260d9918d6191b924a0eaefac287975f4f4055555d43976b22e8346d
-
SHA512
dc86e68375bebefc3dd932d42a98733ddb0e4e15f9b1c5a92022a4047df8daeadeaceb75c9624c4453f0eba0c4225ce13cb053ec8d430bff30f8e67d971ae8ce
-
SSDEEP
12288:eXlc87eqqV5e+wBV6O+MH+TczflyY8CIe:eXSqqHeVBxBH+Tk+he
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea6db186005eb24ffeb379729fa34d77
Files
-
ea6db186005eb24ffeb379729fa34d77.exe windows:5 windows x86 arch:x86
3c6e5793e514214727b5614fbe758755
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l2 Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ