Static task
static1
Behavioral task
behavioral1
Sample
ec4adcf33c044a0cf3457f2cc1df44f34f81c24aa97f7e4f323eda20001a93d2.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ec4adcf33c044a0cf3457f2cc1df44f34f81c24aa97f7e4f323eda20001a93d2.exe
Resource
win10v2004-20240611-en
General
-
Target
ec4adcf33c044a0cf3457f2cc1df44f34f81c24aa97f7e4f323eda20001a93d2
-
Size
12.7MB
-
MD5
d90a94ab7ed4e9fbd770f6bee7bd65b0
-
SHA1
27685cbaa71889808242971cc9fac2d60e2f86b1
-
SHA256
ec4adcf33c044a0cf3457f2cc1df44f34f81c24aa97f7e4f323eda20001a93d2
-
SHA512
d98a0e3b33dcda960a816806e221bb3bd84ca7401ecdc57d37da0b62bf91bbb1395b6f6eb7377ab0c1ec64eb6db653831e974d117847c4586d90650fb1d9f50c
-
SSDEEP
12288:R2Xq2Cg3hO+S6f7b/6Je/BZ7uMQZNSqB8EXvpRA+kX+3zqtpsHAdHEx5OcwceAAe:YVCQtP/c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec4adcf33c044a0cf3457f2cc1df44f34f81c24aa97f7e4f323eda20001a93d2
Files
-
ec4adcf33c044a0cf3457f2cc1df44f34f81c24aa97f7e4f323eda20001a93d2.exe windows:5 windows x64 arch:x64
e56b9e26f002f4a1712b2af568c21fe9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
PathFileExistsW
kernel32
Process32FirstW
OpenProcess
Process32NextW
WideCharToMultiByte
GetWindowsDirectoryW
ResumeThread
TerminateProcess
WaitForSingleObject
GetTickCount
Sleep
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
LoadLibraryA
VirtualFreeEx
VirtualProtectEx
ReadProcessMemory
CreateToolhelp32Snapshot
VirtualQueryEx
GetLastError
CreateProcessW
ExitProcess
GetProcAddress
GetModuleHandleW
FlushFileBuffers
CloseHandle
GetCurrentProcess
SetLastError
DecodePointer
CreateFileA
WriteConsoleW
RtlUnwindEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
FlsAlloc
HeapAlloc
RaiseException
RtlPcToFileHeader
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapSize
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
SetStdHandle
WriteConsoleA
VirtualAlloc
user32
wsprintfW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteW
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ