Static task
static1
Behavioral task
behavioral1
Sample
e1f52ea30d25289f7a4a5c9d15be97c8a4dfe10eb68ac9d031edcc7275c23dbc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e1f52ea30d25289f7a4a5c9d15be97c8a4dfe10eb68ac9d031edcc7275c23dbc.exe
Resource
win10v2004-20240226-en
General
-
Target
e1f52ea30d25289f7a4a5c9d15be97c8a4dfe10eb68ac9d031edcc7275c23dbc
-
Size
981KB
-
MD5
18864d22331fc6503641f128226aaea8
-
SHA1
994ebbe444183e0d67b13f91d75b0f9bcfb011db
-
SHA256
e1f52ea30d25289f7a4a5c9d15be97c8a4dfe10eb68ac9d031edcc7275c23dbc
-
SHA512
074b9e462699057455908284bbdbefa0bc03af3d87feae889a7a769f1a1ce663ff96e03822f083766a06d12e070008d08e16ac5dfc8fdc07e87f1b00ef7cef10
-
SSDEEP
12288:pEtNt4v6RhbJ6dLfSUzu2naz9ZpGIKMenYAS7DQrwlxDntG5nqV5+J69M5Hsx4SL:pEt8KoDu2n7IPeYAS7DQoVn0o+quljU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1f52ea30d25289f7a4a5c9d15be97c8a4dfe10eb68ac9d031edcc7275c23dbc
Files
-
e1f52ea30d25289f7a4a5c9d15be97c8a4dfe10eb68ac9d031edcc7275c23dbc.exe windows:5 windows x86 arch:x86
0f09ea2a68d04f331df9a5d0f8641332
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
Sleep
LoadResource
SizeofResource
FindClose
CloseHandle
CreateMutexA
OpenMutexA
GetModuleFileNameA
GetModuleHandleA
CreateProcessA
FindResourceW
FindResourceExW
GetTempPathA
CreateDirectoryA
RemoveDirectoryA
GetFullPathNameW
QueryDosDeviceW
SetFileAttributesA
DeleteFileA
FindFirstFileW
FindNextFileW
CopyFileA
GetPriorityClass
GetVersionExA
FindFirstVolumeW
TerminateProcess
FindVolumeClose
GetVolumePathNamesForVolumeNameW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
GetVersionExW
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
GetCurrentProcessId
OpenProcess
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
LockResource
HeapDestroy
InterlockedDecrement
FindNextVolumeW
DecodePointer
SetEndOfFile
CreateFileW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileAttributesExW
GetExitCodeProcess
WaitForSingleObject
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetACP
WriteFile
WriteConsoleW
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
VirtualQuery
FreeLibrary
DuplicateHandle
GetCurrentThread
GetExitCodeThread
TryEnterCriticalSection
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetCPInfo
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
OutputDebugStringW
LocalFree
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
LoadLibraryExW
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetSystemInfo
VirtualAlloc
VirtualProtect
ReadFile
GetStdHandle
user32
RegisterClassExA
CreateWindowExA
PostQuitMessage
DefWindowProcA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
wsprintfA
GetDC
ReleaseDC
ShowWindow
IsWindowVisible
GetCursorPos
GetSystemMetrics
TrackPopupMenu
GetDesktopWindow
LoadCursorA
LoadIconA
SetForegroundWindow
gdi32
SelectObject
DeleteObject
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetObjectA
advapi32
SetKernelObjectSecurity
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitializeSecurity
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
shlwapi
PathFindExtensionA
PathFindExtensionW
gdiplus
GdipCloneImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromScan0
wininet
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
urlmon
URLDownloadToFileA
ObtainUserAgentString
Sections
.text Size: 657KB - Virtual size: 657KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ