Static task
static1
Behavioral task
behavioral1
Sample
e4cf98be65db03a7231d2e3807241901a2541023e38fee69facdc25ce11cb58f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e4cf98be65db03a7231d2e3807241901a2541023e38fee69facdc25ce11cb58f.exe
Resource
win10v2004-20240226-en
General
-
Target
e4cf98be65db03a7231d2e3807241901a2541023e38fee69facdc25ce11cb58f
-
Size
28KB
-
MD5
dff46f036922ce4a8f48e56170d1d8bf
-
SHA1
33c51bd7e1ed02516723687a5fc61dae37d9018e
-
SHA256
e4cf98be65db03a7231d2e3807241901a2541023e38fee69facdc25ce11cb58f
-
SHA512
dbf22cb69c26361928e13ab5034190a063502eb654a2d490425d8ab0143a1e3c5de91a5322bf097f33e48486dac7c15158a7abe194eb400fe548e0238a9d5dee
-
SSDEEP
384:Ul6WXbAzu/EztWcI5yz13k0hK3otSrLaMoHMl6646T:PWXbNEIc/13k0h0otSXvoH3V6T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4cf98be65db03a7231d2e3807241901a2541023e38fee69facdc25ce11cb58f
Files
-
e4cf98be65db03a7231d2e3807241901a2541023e38fee69facdc25ce11cb58f.exe windows:4 windows x86 arch:x86
31a470fe8906ab8b2aa974ed06d64c78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetTempPathA
DeleteFileA
CreateProcessA
WaitForSingleObject
GetLastError
SetEvent
GetModuleFileNameA
CreateEventA
GetModuleHandleA
user32
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
GetMessageA
LoadIconA
PostQuitMessage
DefWindowProcA
PostMessageA
TranslateMessage
LoadCursorA
DispatchMessageA
gdi32
GetStockObject
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromProgID
oleaut32
VariantClear
SysAllocString
msvcp60
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
??_7?$basic_ofstream@DU?$char_traits@D@std@@@std@@6B@
?_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@12@@Z
??_7?$basic_filebuf@DU?$char_traits@D@std@@@std@@6B@
??0locale@std@@QAE@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N1@Z
??0ios_base@std@@IAE@XZ
??_8?$basic_ofstream@DU?$char_traits@D@std@@@std@@7B@
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??1ios_base@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??1locale@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
msvcrt
strncpy
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
free
strrchr
strchr
_mbsnbcmp
_mbsnbcpy
_mbscmp
??2@YAPAXI@Z
sprintf
__CxxFrameHandler
_beginthreadex
fclose
_controlfp
strstr
_vsnprintf
_CxxThrowException
atol
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE