Static task
static1
Behavioral task
behavioral1
Sample
e1b09b9a2799deedfaaaff9529e62c72637e528a8c4107101a640e2e57a8fcbb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1b09b9a2799deedfaaaff9529e62c72637e528a8c4107101a640e2e57a8fcbb.exe
Resource
win10v2004-20240226-en
General
-
Target
e1b09b9a2799deedfaaaff9529e62c72637e528a8c4107101a640e2e57a8fcbb
-
Size
252KB
-
MD5
a34d89d4db371a359e0c08edf9f064c7
-
SHA1
d1be75d867d09ef2df21d1ce961291e4830598be
-
SHA256
e1b09b9a2799deedfaaaff9529e62c72637e528a8c4107101a640e2e57a8fcbb
-
SHA512
edd56ff9a0e5a1513be2467600ce4bbb1714edb04fcb3fd6bd7ae424d314483999360d0599ba1c3a3cd52f54248781a123610ee79ac1b0f27ad25e8a88dc10a4
-
SSDEEP
6144:0FwErUc/tTrZdBZlXaBn8g2CJHrxyMnY:07YWzZcoMLxyh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1b09b9a2799deedfaaaff9529e62c72637e528a8c4107101a640e2e57a8fcbb
Files
-
e1b09b9a2799deedfaaaff9529e62c72637e528a8c4107101a640e2e57a8fcbb.exe windows:4 windows x86 arch:x86
cbe53f9a8e5e8ba8b123369d5515d290
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_endthreadex
__CxxFrameHandler
_beginthreadex
_except_handler3
sprintf
isdigit
calloc
printf
perror
_errno
strerror
fflush
sscanf
wcstombs
mbstowcs
wcscpy
fprintf
strcat
toupper
fputc
wcscat
strtok
_ftol
__p__commode
srand
fwrite
fseek
ftell
malloc
free
exit
strncmp
atof
memcmp
strchr
_memccpy
_itoa
_stricmp
strncat
system
atoi
strcpy
fgets
fopen
fread
strcmp
fclose
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
memset
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
__p__fmode
__set_app_type
_controlfp
rand
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
RaiseException
TlsSetValue
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
InterlockedIncrement
GetThreadPriority
EnterCriticalSection
LeaveCriticalSection
ResumeThread
WaitForSingleObject
ResetEvent
InterlockedDecrement
TransactNamedPipe
MultiByteToWideChar
GetLastError
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
TerminateProcess
CloseHandle
GetTickCount
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
ExitProcess
GetSystemDirectoryA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
ReadFile
user32
ExitWindowsEx
wsprintfA
advapi32
OpenServiceA
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
DeleteService
ControlService
EnumServicesStatusA
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
RegDeleteValueA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
ws2_32
gethostname
sendto
htonl
setsockopt
WSASocketA
ntohl
WSASetLastError
WSAIoctl
getservbyname
shutdown
ntohs
gethostbyaddr
inet_ntoa
gethostbyname
ioctlsocket
getpeername
getsockname
send
connect
WSACleanup
WSAStartup
inet_addr
recv
WSAGetLastError
select
__WSAFDIsSet
accept
bind
listen
closesocket
socket
getsockopt
htons
netapi32
NetUseDel
NetApiBufferFree
NetShareEnum
NetUserEnum
NetScheduleJobAdd
NetRemoteTOD
NetUseAdd
mpr
WNetAddConnection2A
WNetCancelConnection2W
WNetCancelConnection2A
WNetAddConnection2W
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
dnsapi
DnsQuery_A
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 48KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.asdfe Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE