Static task
static1
Behavioral task
behavioral1
Sample
e54b46b93f4d846cb26c10187bee2bfccce6dfd8432a0a163a001ac281ea3274.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e54b46b93f4d846cb26c10187bee2bfccce6dfd8432a0a163a001ac281ea3274.exe
Resource
win10v2004-20240426-en
General
-
Target
e54b46b93f4d846cb26c10187bee2bfccce6dfd8432a0a163a001ac281ea3274
-
Size
1.4MB
-
MD5
5fa12e1523d8a684f524d1a41c06a7a7
-
SHA1
277d2b8405df0ac7700f0e835e10c1bd1fcf98ee
-
SHA256
e54b46b93f4d846cb26c10187bee2bfccce6dfd8432a0a163a001ac281ea3274
-
SHA512
0017313f16254a566d17e7b306df3f3b70cd23b868dc8501d02e3f084fe204f9ca20189a6e8470391f2b8baf5a89f26d2d97d0799664dbc93f425916c49d0033
-
SSDEEP
24576:Mcrm44B9NlSN7s+GK5aOQ5I2FfPqVFXp+5HvsMu7X9OrIAKQa8HjJrx91YMZHVSv:HrmnbNUN79naf5RfEp+5HvUhOy34JF9R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e54b46b93f4d846cb26c10187bee2bfccce6dfd8432a0a163a001ac281ea3274
Files
-
e54b46b93f4d846cb26c10187bee2bfccce6dfd8432a0a163a001ac281ea3274.exe windows:6 windows x64 arch:x64
03dab82549fe6439dded2b0238e1b324
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetConsoleScreenBufferInfo
HeapFree
CreateEventExW
GetStdHandle
GetShortPathNameW
GetModuleFileNameW
SetConsoleWindowInfo
GetEnvironmentVariableW
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
K32GetDeviceDriverBaseNameW
SetEvent
SizeofResource
WaitForSingleObjectEx
LockResource
Process32FirstW
GlobalFree
CloseHandle
LoadResource
FindResourceW
HeapAlloc
GetProcAddress
GetProcessHeap
CreateProcessW
GetModuleHandleW
lstrcpyW
SetEndOfFile
lstrcatW
K32EnumDeviceDrivers
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
WriteFile
GetFileSizeEx
SetFilePointerEx
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
RtlUnwind
advapi32
GetUserNameA
shell32
ShellExecuteW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
winhttp
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSendRequest
WinHttpSetStatusCallback
WinHttpConnect
WinHttpCrackUrl
ntdll
RtlInitUnicodeString
NtQueryLicenseValue
Sections
.text Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 537KB - Virtual size: 542KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 585KB - Virtual size: 585KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ