Eula.pdb
Static task
static1
Behavioral task
behavioral1
Sample
02e7be88d3da89f6d1d442540da854775fbfb0cc831f0681ea694050b194d6a4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02e7be88d3da89f6d1d442540da854775fbfb0cc831f0681ea694050b194d6a4.exe
Resource
win10v2004-20240412-en
General
-
Target
02e7be88d3da89f6d1d442540da854775fbfb0cc831f0681ea694050b194d6a4
-
Size
3.7MB
-
MD5
7ef46e1bb3cc5aeac888ac839ffcb91a
-
SHA1
3d02f4c6c0db6b9f8e1886584237514391c10d9a
-
SHA256
02e7be88d3da89f6d1d442540da854775fbfb0cc831f0681ea694050b194d6a4
-
SHA512
a208039ba7c881fcf824c2567dc5d169ac1113c611aeaeb001409480899ced671f2f887ea07f4b0b5647015ff103f64092195d1ca6c83c0616d4169c9e775426
-
SSDEEP
49152:0hjwDHN9hRN9hjwDWwnNTBHLfUFakOElMaFLkIoJdXN0BMOwLloBrugPrRokpP:0h8hRhS2ak7OJdXN0B7+shrRokJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02e7be88d3da89f6d1d442540da854775fbfb0cc831f0681ea694050b194d6a4
Files
-
02e7be88d3da89f6d1d442540da854775fbfb0cc831f0681ea694050b194d6a4.exe windows:5 windows x86 arch:x86
93e5f4af0ddc1affa0ec93d180e742ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatW
lstrlenW
lstrcpyW
FlushInstructionCache
GetCurrentProcess
LoadLibraryW
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetCurrentThreadId
LoadLibraryA
GetPrivateProfileStringW
MultiByteToWideChar
lstrlenA
CopyFileW
LockResource
LoadResource
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalHandle
GetPrivateProfileIntW
lstrcpynW
FindFirstFileW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
Sleep
InterlockedExchange
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
FindClose
FindResourceW
GlobalAlloc
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
RaiseException
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetFullPathNameW
user32
IsWindowEnabled
RedrawWindow
GetClientRect
SetWindowPos
MoveWindow
FillRect
SetWindowTextW
DefWindowProcW
DialogBoxIndirectParamW
GetClassInfoExW
RegisterClassExW
GetWindowLongW
SetWindowLongW
CreateWindowExW
GetWindowTextW
GetSysColor
EnableWindow
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
SetCapture
IsChild
GetParent
GetClassNameW
CharNextW
ReleaseCapture
GetActiveWindow
RegisterWindowMessageW
GetWindowTextLengthW
CreateAcceleratorTableW
LoadCursorW
DestroyAcceleratorTable
IsWindow
GetFocus
SetFocus
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
DestroyWindow
ClientToScreen
EndDialog
GetSystemMetrics
MapDialogRect
SendMessageW
SetWindowContextHelpId
GetDlgItem
GetWindow
SetDlgItemTextW
SendDlgItemMessageW
GetDlgItemTextW
UnregisterClassA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
GetObjectW
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
BitBlt
GetDeviceCaps
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
ole32
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
oleaut32
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
SysStringLen
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
SysFreeString
DispCallFunc
msvcr100
wcslen
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
?terminate@@YAXXZ
_wtoi64
malloc
swprintf_s
??2@YAPAXI@Z
calloc
??_U@YAPAXI@Z
memcmp
_recalloc
__CxxFrameHandler3
_wtoi
wcscpy_s
wcscspn
wcsncpy_s
memset
memcpy_s
_CxxThrowException
free
??_V@YAXPAX@Z
??3@YAXPAX@Z
_controlfp_s
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ