Static task
static1
Behavioral task
behavioral1
Sample
e93a96e597071fa868c93ac3e90c2c8d8b8c82e9252f1c919f3df80ed8775481.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e93a96e597071fa868c93ac3e90c2c8d8b8c82e9252f1c919f3df80ed8775481.exe
Resource
win10v2004-20240226-en
General
-
Target
e93a96e597071fa868c93ac3e90c2c8d8b8c82e9252f1c919f3df80ed8775481
-
Size
207KB
-
MD5
f0dba8a8349552e5e632d395cd1be8ea
-
SHA1
e5c03f791e1c42344539a7e2d3308030271ab822
-
SHA256
e93a96e597071fa868c93ac3e90c2c8d8b8c82e9252f1c919f3df80ed8775481
-
SHA512
e200dc5b59852291192e0464d7220975ef146692798b1991ffb3c80ff9c53e00ec48f24ce6a0c2e4769056bab6615c5d80172670bc5b35cf3eab113cae53d997
-
SSDEEP
3072:8eWtBGpSbINCVwymzEw+so37YckFaHsEiUrqDzhv2EC+xVJf5wi:IvESkCVwysj+so370FaH2zhv8YVJOi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e93a96e597071fa868c93ac3e90c2c8d8b8c82e9252f1c919f3df80ed8775481
Files
-
e93a96e597071fa868c93ac3e90c2c8d8b8c82e9252f1c919f3df80ed8775481.exe windows:5 windows x86 arch:x86
9d6ffaf378c13ac157bf23e4ded0ca18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
kernel32
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
FreeLibrary
LCMapStringA
LCMapStringW
SetEndOfFile
GetProcessHeap
ReadFile
CompareStringA
lstrlenA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
LocalAlloc
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
LocalReAlloc
GetModuleHandleA
GlobalAddAtomA
lstrcmpA
GlobalFlags
GlobalGetAtomNameA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
SetFilePointer
RtlUnwind
GetCurrentThreadId
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InterlockedIncrement
RaiseException
WriteFile
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetStartupInfoA
GetCommandLineA
ExitProcess
GetProcAddress
GetModuleHandleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
LeaveCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsA
GetModuleFileNameA
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CreateEventA
SetLastError
DeleteFileA
WinExec
Sleep
GetComputerNameA
GetWindowsDirectoryA
GetVersionExA
InterlockedDecrement
FindResourceA
SizeofResource
LockResource
LoadResource
GetLastError
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WriteConsoleW
user32
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
DestroyMenu
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GrayStringA
DrawTextExA
DrawTextA
GetClassInfoA
TabbedTextOutA
CreateWindowExA
DispatchMessageA
GetMessageA
SetTimer
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
shell32
SHGetSpecialFolderLocation
ShellExecuteA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ole32
CoInitialize
CoSetProxyBlanket
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
VariantChangeType
VariantClear
SysAllocString
SysFreeString
VariantInit
urlmon
URLDownloadToFileA
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
GetStockObject
SetViewportOrgEx
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
ExtTextOutA
SaveDC
DeleteDC
SetMapMode
SelectObject
Escape
TextOutA
RectVisible
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
ScaleViewportExtEx
SetViewportExtEx
RestoreDC
GetDeviceCaps
PtVisible
OffsetViewportOrgEx
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ