Static task
static1
Behavioral task
behavioral1
Sample
e926b44c89d0fd70aabf5e1c19769fdbdee5f89f161fba8e0d0979242e139b4e.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e926b44c89d0fd70aabf5e1c19769fdbdee5f89f161fba8e0d0979242e139b4e.exe
Resource
win10v2004-20240508-en
General
-
Target
e926b44c89d0fd70aabf5e1c19769fdbdee5f89f161fba8e0d0979242e139b4e
-
Size
522KB
-
MD5
306f84453ebe784a825c5ed7eef0bb0c
-
SHA1
06684cb1345c687834111d444125ae6e300f6bd7
-
SHA256
e926b44c89d0fd70aabf5e1c19769fdbdee5f89f161fba8e0d0979242e139b4e
-
SHA512
c209eb3c49f55e9a0b9fca6d2c1e51244fa3672f111461a41eb66498c7b76f2357844b8f4c94140ca689aa557badd76473e48509e9927e955ef33c14fb923822
-
SSDEEP
6144:vsUtq5vthy5phMDHFVYs6KjyHv3tTQsVENLUIXKbvlMU5vfxb4VhEri0+YIRGUAl:HtathIgHlQ5QsmxbeuU5v5bOe0RB4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e926b44c89d0fd70aabf5e1c19769fdbdee5f89f161fba8e0d0979242e139b4e
Files
-
e926b44c89d0fd70aabf5e1c19769fdbdee5f89f161fba8e0d0979242e139b4e.exe windows:4 windows x64 arch:x64
f8ee969f96d8797df3e324247d223e17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateProcessA
CreateSemaphoreW
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReleaseSemaphore
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_close
_dup
_errno
_findclose
_findfirst64
_fmode
_fstat64
_fullpath
_get_osfhandle
_initterm
_localtime64
_lock
_onexit
_open
_pipe
_read
_stat64
_stricmp
_time64
_unlock
_vsnprintf
abort
asctime
atoi
bsearch
calloc
exit
fclose
feof
ferror
fflush
fgets
fopen
fprintf
fputc
fputs
fread
free
freopen
fseek
ftell
fwrite
getc
getenv
islower
isspace
isupper
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
putc
qsort
raise
realloc
remove
rename
signal
sprintf
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strlen
strncat
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtol
strtoul
tolower
ungetc
vfprintf
vsprintf
wcslen
_findnext64
_write
_unlink
_strdup
_read
_putenv
_open
_lseek
_isatty
_getpid
_getcwd
_fileno
_fdopen
_close
_chdir
_access
user32
CharLowerBuffA
Sections
.text Size: 405KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE