Static task
static1
Behavioral task
behavioral1
Sample
e4b8b975afea03d05f50376eb5c218749b47859a4f0c8ac582b79cbb87602e9e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e4b8b975afea03d05f50376eb5c218749b47859a4f0c8ac582b79cbb87602e9e.exe
Resource
win10v2004-20240426-en
General
-
Target
e4b8b975afea03d05f50376eb5c218749b47859a4f0c8ac582b79cbb87602e9e
-
Size
315KB
-
MD5
69066be06dec8fbead5d81a8c1f1ecde
-
SHA1
380d227ce15255497c37d169d6dae99ad1b4d845
-
SHA256
e4b8b975afea03d05f50376eb5c218749b47859a4f0c8ac582b79cbb87602e9e
-
SHA512
d439be38c5b572c8ddce224932dcde8608e20b63326748cb47881330db035ccd15b2205735da9db9806c5e7db588fb51e4afea49f56313871d6da80305c490d0
-
SSDEEP
6144:q40W7UXPpy1t5WfTAr9mbwJXOctWN5oZXuC+liAxprQZIM:n0W7UXPp4t5O+9mbw/uC+YAxFQZIM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4b8b975afea03d05f50376eb5c218749b47859a4f0c8ac582b79cbb87602e9e
Files
-
e4b8b975afea03d05f50376eb5c218749b47859a4f0c8ac582b79cbb87602e9e.exe windows:5 windows x86 arch:x86
9f3ee3f3c3726c75bbc6e66ab6cb1119
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
GetTickCount
WriteFile
Sleep
GetModuleFileNameW
CreateFileW
GetLastError
CreateFileMappingW
DeleteFileW
GetTempPathA
GetVersionExW
FreeLibrary
GetFileSize
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
HeapAlloc
HeapFree
GetProcessHeap
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
GetModuleHandleW
CloseHandle
VirtualFree
GetFullPathNameW
WriteConsoleW
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
SetFilePointerEx
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetFilePointer
ReadConsoleW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineW
RaiseException
InitializeCriticalSectionAndSpinCount
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
IsDebuggerPresent
GetCurrentThreadId
GetStdHandle
IsValidCodePage
GetACP
GetOEMCP
ReadFile
GetConsoleMode
VirtualQuery
gdi32
CreateBitmap
SelectObject
CreateCompatibleDC
GetObjectW
DeleteDC
user32
DestroyWindow
UpdateLayeredWindow
SetTimer
GetWindowRect
MonitorFromPoint
LoadCursorW
GetDC
TranslateMessage
PeekMessageW
ReleaseDC
GetDesktopWindow
ShowWindow
CreateWindowExW
RegisterClassW
UpdateWindow
GetMonitorInfoW
DefWindowProcW
DispatchMessageW
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ