Static task
static1
Behavioral task
behavioral1
Sample
e87f4fbd6e2f1d0b9fb60f406426f37aa553fddb3fae9bd90c75e6b974c87f54.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
e87f4fbd6e2f1d0b9fb60f406426f37aa553fddb3fae9bd90c75e6b974c87f54.exe
Resource
win11-20240611-en
General
-
Target
e87f4fbd6e2f1d0b9fb60f406426f37aa553fddb3fae9bd90c75e6b974c87f54
-
Size
211KB
-
MD5
312b45796cda14415d5351864feb473a
-
SHA1
91a2a9cf56e92e5339958c76b627d0e0c47ca5f5
-
SHA256
e87f4fbd6e2f1d0b9fb60f406426f37aa553fddb3fae9bd90c75e6b974c87f54
-
SHA512
396e5830a6f1f75c34966deeec01bcdd4bb1028bcfdac66e8bd89548757c5335a746da6fd5a71c4f07774701764ae695a02875c392edc170608cb46740f9f546
-
SSDEEP
3072:SGEmLZcDA78GjOk7FIx9f5pnYFRmgJnc66+E6yDVz8:tZcDE8GjjWx9f52/tJc7V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e87f4fbd6e2f1d0b9fb60f406426f37aa553fddb3fae9bd90c75e6b974c87f54
Files
-
e87f4fbd6e2f1d0b9fb60f406426f37aa553fddb3fae9bd90c75e6b974c87f54.exe windows:5 windows x86 arch:x86
2fe0439d0393ba8fc80aa720237be5bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
WriteConsoleInputW
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
LoadLibraryExW
InterlockedIncrement
CreateDirectoryW
GlobalLock
GetWindowsDirectoryA
GlobalFindAtomA
LoadLibraryW
AssignProcessToJobObject
ReplaceFileA
SetLastError
RemoveVectoredExceptionHandler
LoadLibraryA
LocalAlloc
GetDiskFreeSpaceA
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingA
SetFileAttributesW
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
GetDateFormatW
GetProcAddress
GetSystemDefaultLangID
MultiByteToWideChar
DecodePointer
EncodePointer
GetLastError
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedDecrement
GetACP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
Sleep
RtlUnwind
HeapSize
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
OpenIcon
CharUpperBuffW
GetClassInfoW
GetKeyboardLayoutNameW
DdeCmpStringHandles
GetCaretPos
SetMessageExtraInfo
advapi32
AreAllAccessesGranted
ClearEventLogW
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ