Static task
static1
Behavioral task
behavioral1
Sample
e23e2719ca96100c6a0b84565b32da25767c761e1a16eefd6c69eea7d073676b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e23e2719ca96100c6a0b84565b32da25767c761e1a16eefd6c69eea7d073676b.exe
Resource
win10v2004-20240426-en
General
-
Target
e23e2719ca96100c6a0b84565b32da25767c761e1a16eefd6c69eea7d073676b
-
Size
248KB
-
MD5
4cee92258fe0c3f05388613946512b8b
-
SHA1
5404292f11053c77d772dc61b87d42c7c078da14
-
SHA256
e23e2719ca96100c6a0b84565b32da25767c761e1a16eefd6c69eea7d073676b
-
SHA512
dd17d453b7400c209ddccf6b20e20c8bfab4db8c654f4ed6a08c13a685c42ae17864a07991de7790a2842950f5a1a193923da054d0c53e24427a9ffc693ff5e7
-
SSDEEP
3072:rZRjXZx2y1G98yAoGH9/UtcUU3Nhp6WB0eBESAPnCp+bZC4j5S9PkYU2piwz:3Nxq4VdscUY7jbAP2tig
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e23e2719ca96100c6a0b84565b32da25767c761e1a16eefd6c69eea7d073676b
Files
-
e23e2719ca96100c6a0b84565b32da25767c761e1a16eefd6c69eea7d073676b.exe windows:1 windows x86 arch:x86
f3bfb83f4fd037dfbcc44f622b9d9cf0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
c60ascx
ASCII
c60runx
Cla$ACCEPTED
Cla$ADDqueue
Cla$ALIAS
Cla$AssertFailed
Cla$AssertFailedM
Cla$AssignRefUfo
Cla$BEEP
Cla$CLEAR
Cla$CLOCK
Cla$CLOSEwindow
Cla$code
Cla$comparestr
Cla$DecDistinct
Cla$DecDistinctR
Cla$DecDivide
Cla$DecMul
Cla$DELETEqueue
Cla$DELETEREG
Cla$DISABLE
Cla$DISPLAY
Cla$DISPOSEqueue
Cla$DISPOSEref
Cla$Dlongpower
Cla$DPopLong
Cla$DPopUlong
Cla$DPushLong
Cla$ENABLE
Cla$EndEventLoop
Cla$ERRORCODE
Cla$EVENT
Cla$FIELD
Cla$FILEERRORCODE
Cla$FILEERRORMSG
Cla$FileExists
Cla$FILE_ADDf
Cla$FILE_CLOSE
Cla$FILE_CREATE
CLA$FILE_DESTROY
Cla$FILE_NAME
Cla$FILE_OPEN
Cla$FILE_POSITIONf
Cla$FILE_POSITIONk
Cla$FILE_REGETf
Cla$FILE_REGETk
Cla$FOCUS
Cla$FREEqueue
Cla$FREEqueuea
Cla$freestr
Cla$FreeUfo
Cla$freewindow
Cla$GETINI
Cla$GetPropS
Cla$GETqueuekey
Cla$GETqueueptr
Cla$GETREG
Cla$HALT
Cla$init
Cla$INSTANCE
Cla$KEYCODE
Cla$longtostr
Cla$Mem2Ufo
Cla$MessageBox
Cla$NewCriticalSection
Cla$NewMemB
Cla$NewMemT
Cla$NEWqueue
Cla$NOTIFICATION
Cla$OPENowned
Cla$OPENwindow
Cla$POINTERqueue
Cla$PopAString
Cla$PopBind
Cla$PopCString
Cla$PopString
Cla$PopTemp
Cla$POST
Cla$PushAString
Cla$PushBind
Cla$PushCString
Cla$PushLong
Cla$PushPictDec
Cla$PushPictLong
Cla$PushString
Cla$PushUfo
Cla$PUTINI
Cla$PUTqueue
Cla$PUTREG
Cla$pwopen
Cla$RECORDSqueue
Cla$RefAssignAny
Cla$RUN
Cla$SELECT
Cla$SETCURSOR
Cla$SETKEYCODE
Cla$SetPropS
Cla$SetPropV
Cla$Stack2DStack
Cla$Stack2Ufo
Cla$StackCLIP
Cla$StackCompareN
Cla$StackCompareNEQ
Cla$StackConcat
Cla$StackConcatR
Cla$StackErrstr
Cla$StackHeap
Cla$StackINSTRING
Cla$StackLen
Cla$StackRotate
Cla$StackSUB
Cla$StackUPPER
Cla$StartEventLoop
Cla$StashBP
Cla$storecstr
Cla$storestr
Cla$THREAD
Cla$TODAY
Cla$UNHIDE
Cla$UNREGISTEREVENT
Cla$WHAT
THR$GetInstance
Wsl$CloseDown
_exit
_free
_malloc
__sysinit
__sysstart
ftp4w32
FtpAbort
FtpBytesToBeTransferred
FtpCloseConnection
FtpCWD
FtpInit
FtpLocalClose
FtpLogin
FtpRecvFile
FtpRelease
FtpSetAsynchronousMode
user32
CallWindowProcA
SystemParametersInfoA
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cwtls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cwdebug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ