Eula.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e53abc136f2525da6668afd83b89c972502e99fc3bdf6ed09598338b3ae8ab9d.exe
Resource
win7-20240221-en
General
-
Target
e53abc136f2525da6668afd83b89c972502e99fc3bdf6ed09598338b3ae8ab9d
-
Size
644KB
-
MD5
d1db0b28201225fcd0d8ed64a7ddd0f9
-
SHA1
a3325b363de1db09ec9b1ab953b7058b5f2b3d16
-
SHA256
e53abc136f2525da6668afd83b89c972502e99fc3bdf6ed09598338b3ae8ab9d
-
SHA512
84b18dbc04912c0581113b9d4a220fa951823b49c0453ce66d6a75fbabb49e2968721efc9cd26a3c0409b167e6a6eae0b9f775606b82e181afd52abd108c615b
-
SSDEEP
12288:3CgzriPo2f3p6UjKvDhFwOz0/QGoFiYldaFMi9nEE8h+9oRWk:LrIoip66KfwOI4GofidEE8h+9o4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e53abc136f2525da6668afd83b89c972502e99fc3bdf6ed09598338b3ae8ab9d
Files
-
e53abc136f2525da6668afd83b89c972502e99fc3bdf6ed09598338b3ae8ab9d.exe windows:6 windows x86 arch:x86
a7efdb32c3d9157dba5f5d9e1802d5f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LeaveCriticalSection
GetCurrentProcess
GetCurrentThreadId
FlushInstructionCache
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
MulDiv
lstrcmpW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenW
LoadLibraryA
FindResourceW
EnterCriticalSection
GetPrivateProfileStringW
CopyFileW
MultiByteToWideChar
DecodePointer
GetCurrentProcessId
QueryPerformanceCounter
EncodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
OutputDebugStringW
IsDebuggerPresent
GetFullPathNameW
FindFirstFileW
FindClose
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
OutputDebugStringA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetLastError
GetLastError
RaiseException
GetPrivateProfileIntW
GetSystemTimeAsFileTime
user32
UnregisterClassW
RegisterWindowMessageW
SendMessageW
DefWindowProcW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
IsChild
DestroyWindow
MoveWindow
SetWindowPos
EndDialog
GetDlgItem
SetDlgItemTextW
GetDlgItemTextW
SendDlgItemMessageW
CharNextW
SetFocus
GetActiveWindow
GetFocus
SetCapture
ReleaseCapture
EnableWindow
IsWindowEnabled
CreateAcceleratorTableW
DestroyAcceleratorTable
GetSystemMetrics
MapDialogRect
LoadCursorW
GetWindow
GetClassNameW
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowLongW
FillRect
GetSysColor
ScreenToClient
ClientToScreen
SetWindowContextHelpId
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DialogBoxIndirectParamW
gdi32
DeleteDC
DeleteObject
CreateSolidBrush
SelectObject
GetObjectW
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
GetDeviceCaps
BitBlt
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
ole32
CreateStreamOnHGlobal
CoGetClassObject
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
OleLockRunning
oleaut32
VariantInit
OleCreateFontIndirect
SysFreeString
SysAllocString
SysAllocStringLen
SysStringLen
VariantClear
LoadTypeLi
LoadRegTypeLi
DispCallFunc
msvcr120
_controlfp_s
_invoke_watson
__crtSetUnhandledExceptionFilter
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_commode
_fmode
_wcmdln
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__crtGetShowWindowMode
_XcptFilter
??1type_info@@UAE@XZ
_except_handler4_common
_onexit
__dllonexit
_calloc_crt
_unlock
_lock
?terminate@@YAXXZ
__CxxFrameHandler3
_CxxThrowException
swprintf_s
wcsncpy_s
wcslen
wcscspn
wcscpy_s
strlen
memcpy_s
memcmp
??_U@YAPAXI@Z
_wtoi64
_wtoi
_recalloc
malloc
calloc
??2@YAPAXI@Z
memset
??_V@YAXPAX@Z
free
??3@YAXPAX@Z
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE