Static task
static1
Behavioral task
behavioral1
Sample
eecebbf998ed76d35aff1aedfd015480d3e8be6e8587916c6d4f732b5a4d9731.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eecebbf998ed76d35aff1aedfd015480d3e8be6e8587916c6d4f732b5a4d9731.exe
Resource
win10v2004-20240508-en
General
-
Target
eecebbf998ed76d35aff1aedfd015480d3e8be6e8587916c6d4f732b5a4d9731
-
Size
94KB
-
MD5
779c7102a869dff9d3663d05df926e97
-
SHA1
668ba593d51fa9fa69454bedaed3f69c97e1b431
-
SHA256
eecebbf998ed76d35aff1aedfd015480d3e8be6e8587916c6d4f732b5a4d9731
-
SHA512
be82f6166757794adff4c765e5fe91a98689e88e459b0921a76337dccfabcd4d07defd15cb088b72869cf590239ce5c10c80dc9d3eb9086afa84b6d74eeb2115
-
SSDEEP
1536:DSo7nfMRr6So9NIh4KpUxDIbalo8Yf5VSJFtcj1dK/eR0JYE2cw:tLkRrYch4KpUxNlo88VSJFtcjXKmRyYr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eecebbf998ed76d35aff1aedfd015480d3e8be6e8587916c6d4f732b5a4d9731
Files
-
eecebbf998ed76d35aff1aedfd015480d3e8be6e8587916c6d4f732b5a4d9731.exe windows:4 windows x86 arch:x86
4333d91df325f779dcf70dac5a3d9480
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetModuleFileNameA
FindFirstFileA
GetPrivateProfileStringA
GetCurrentProcess
GetDriveTypeA
GetVersionExA
WritePrivateProfileStringA
MoveFileExA
GetShortPathNameA
SetFileTime
GetTempPathA
GetFullPathNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GlobalHandle
lstrcatA
GetDiskFreeSpaceA
CloseHandle
GlobalAlloc
GlobalLock
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
SetFileAttributesA
DeleteFileA
GetFileAttributesA
GetLastError
TerminateProcess
GlobalUnlock
SetCurrentDirectoryA
GetCurrentDirectoryA
RaiseException
WinExec
GlobalFree
CreateDirectoryA
HeapFree
SetEnvironmentVariableA
HeapCompact
HeapSize
HeapAlloc
CreateFileA
ReadFile
RtlUnwind
IsBadCodePtr
GetStringTypeA
IsBadReadPtr
LoadLibraryA
LocalAlloc
LocalFree
ExitProcess
WriteFile
GetProcAddress
SetFilePointer
GetStringTypeW
user32
GetWindow
DestroyWindow
GetSysColor
GetDC
GetWindowRect
SendMessageA
ScreenToClient
FillRect
GetDlgItem
EndPaint
SetWindowLongA
BeginPaint
GetClientRect
wsprintfA
ReleaseDC
SetDlgItemTextA
GetParent
SetWindowPos
GetSystemMetrics
SetWindowTextA
PostMessageA
GetDlgItemTextA
OemToCharA
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
AdjustWindowRectEx
UpdateWindow
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
ShowWindow
KillTimer
SetTimer
SetFocus
DialogBoxIndirectParamA
EndDialog
EnableWindow
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
gdi32
GetObjectA
StretchDIBits
GetStockObject
CreateCompatibleDC
DeleteObject
CreateFontIndirectA
CreateSolidBrush
SetBkColor
CreatePalette
ExtTextOutA
GetDeviceCaps
RealizePalette
GetSystemPaletteEntries
IntersectClipRect
TextOutA
SelectPalette
SetBkMode
SelectObject
SetTextColor
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateDIBPatternBrush
comdlg32
GetSaveFileNameA
advapi32
RegOpenKeyA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ