Static task
static1
Behavioral task
behavioral1
Sample
e3266a236f380cbe39088914828aac18098f767382f9f083ed4ff6b5fb191230.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3266a236f380cbe39088914828aac18098f767382f9f083ed4ff6b5fb191230.exe
Resource
win10v2004-20240226-en
General
-
Target
e3266a236f380cbe39088914828aac18098f767382f9f083ed4ff6b5fb191230
-
Size
77KB
-
MD5
f3045e219db8ff174308162e325edb89
-
SHA1
84d235f1e9302a148d239264b0a5e03915e521d0
-
SHA256
e3266a236f380cbe39088914828aac18098f767382f9f083ed4ff6b5fb191230
-
SHA512
c6b3d0550dd8b95cf026a5f0a2b8a33d9febee21827dfd20967cf74d5a9d37e537107783af747ec8c6f3142fbedbf78f800daa598fe2b059e7ec8a4a570a5d46
-
SSDEEP
1536:/Cjez/hEGWnES3ZQ4i+mpprsianFvk6yhzfR:Kiz/hWnp3ZRi+iQnFpUfR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3266a236f380cbe39088914828aac18098f767382f9f083ed4ff6b5fb191230
Files
-
e3266a236f380cbe39088914828aac18098f767382f9f083ed4ff6b5fb191230.exe windows:5 windows x86 arch:x86
b5153c8fa3b3b56ce418ccbddd83b559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetLastError
GetProcAddress
LoadLibraryA
Process32Next
CreateToolhelp32Snapshot
CloseHandle
LocalFree
DeleteFileA
GetLocalTime
GetModuleFileNameA
FlushFileBuffers
Sleep
GetStringTypeW
LCMapStringW
MultiByteToWideChar
WriteConsoleW
SetStdHandle
HeapSize
HeapReAlloc
RtlUnwind
LoadLibraryW
OpenProcess
WriteFile
ExpandEnvironmentStringsA
GetProcessHeap
GetTickCount
WaitForSingleObject
Process32First
HeapFree
GetCurrentProcess
HeapAlloc
SetFilePointer
GetFileSize
IsValidCodePage
GetOEMCP
CreateFileW
CreateFileA
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
user32
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadStringA
SendMessageA
TranslateMessage
CreateWindowExA
ChangeClipboardChain
DefWindowProcA
SendMessageTimeoutA
LoadAcceleratorsA
ShowWindow
DispatchMessageA
UpdateWindow
LoadCursorA
SetClipboardViewer
TranslateAcceleratorA
advapi32
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
OpenProcessToken
RegQueryValueExA
EqualSid
RegSetValueExA
GetTokenInformation
ConvertSidToStringSidA
shlwapi
SHRegGetValueA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ