Static task
static1
Behavioral task
behavioral1
Sample
e5860d2d05685583fd30a71e8585364eb79202e129776b89880e29b91a3d1428.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
e5860d2d05685583fd30a71e8585364eb79202e129776b89880e29b91a3d1428.exe
Resource
win10v2004-20240611-en
General
-
Target
e5860d2d05685583fd30a71e8585364eb79202e129776b89880e29b91a3d1428
-
Size
7.5MB
-
MD5
93561c9ed0b6e8bcc9a8aa8d68b54bf8
-
SHA1
9f017c06da05cb59c9789c33ff282991b9821065
-
SHA256
e5860d2d05685583fd30a71e8585364eb79202e129776b89880e29b91a3d1428
-
SHA512
3f711564f8361fb422f2d24bbb54521bd1952aa00eb7f2034680a420d6e75a8ef4acb992476af1425a040ccaf0e7ab21ef0a020d1bd3cae33a20c3af7771bb06
-
SSDEEP
196608:TId6oiD3QZgmwoVYA+noTi9gV5kB1ZR/zHMmvbrgs2:MjiD6gm0oTgykBRgmDr92
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5860d2d05685583fd30a71e8585364eb79202e129776b89880e29b91a3d1428
Files
-
e5860d2d05685583fd30a71e8585364eb79202e129776b89880e29b91a3d1428.exe windows:5 windows x86 arch:x86
2f6f6d12c4a00f8b2207bb7cb576aa25
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetModuleHandleA
lstrcpyW
lstrcpynW
GetSystemTime
ConvertThreadToFiber
ConvertFiberToThread
GlobalMemoryStatus
CreateFiber
DeleteFiber
SwitchToFiber
SetConsoleMode
ReadConsoleA
GetLocalTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFilePointer
ExitProcess
GetACP
GetCurrentDirectoryW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
WriteConsoleW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetDateFormatW
SetConsoleCtrlHandler
ReadConsoleW
GetModuleHandleExW
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileAttributesExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
PeekNamedPipe
GetStdHandle
GetFileType
WaitForMultipleObjects
GetEnvironmentVariableA
lstrlenW
GlobalUnlock
GlobalLock
VerifyVersionInfoW
MulDiv
VerSetConditionMask
FormatMessageW
GetVersionExW
TerminateProcess
GlobalAlloc
GetSystemDirectoryA
DeviceIoControl
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexW
ReleaseMutex
MoveFileExW
FindNextFileW
FindFirstFileW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
CreateFileA
FindClose
ReadFile
WriteFile
GetFileSize
GetCurrentProcess
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetEnvironmentVariableW
GetTickCount
InitializeCriticalSection
MoveFileW
WideCharToMultiByte
VirtualQuery
LoadLibraryW
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
FreeResource
InterlockedDecrement
GetDriveTypeW
FindResourceExW
CreateThread
GetModuleFileNameW
GetCommandLineW
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
Sleep
SizeofResource
GetModuleFileNameA
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
LocalFree
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
HeapSize
OpenProcess
LocalAlloc
InitializeCriticalSectionAndSpinCount
VirtualAlloc
CompareFileTime
GetSystemDirectoryW
SleepEx
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
VirtualFree
HeapFree
GetTimeFormatW
IsDebuggerPresent
OutputDebugStringW
TryEnterCriticalSection
GetStringTypeW
QueryDosDeviceW
user32
DefWindowProcW
RegisterClassExW
CreateWindowExW
DestroyWindow
SetTimer
KillTimer
GetCursor
GetUserObjectInformationW
GetProcessWindowStation
UpdateWindow
GetDC
ReleaseDC
MonitorFromPoint
IsWindow
SetWindowPos
IsWindowVisible
IsIconic
GetFocus
GetKeyState
SetCapture
ReleaseCapture
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetClientRect
GetWindowRect
GetCursorPos
ScreenToClient
MapWindowPoints
GetSysColor
IntersectRect
UnionRect
OffsetRect
IsRectEmpty
PostMessageW
GetMessageW
PtInRect
GetWindowLongW
SetWindowLongW
GetParent
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
MessageBoxW
GetWindow
LoadImageW
MonitorFromWindow
GetMonitorInfoW
SetCursor
InflateRect
LoadCursorW
SetWindowRgn
wsprintfW
SendMessageW
GetActiveWindow
CallWindowProcW
RegisterClassW
GetClassInfoExW
ShowWindow
EnableWindow
GetSystemMetrics
ActivateKeyboardLayout
PostQuitMessage
SetFocus
SetPropW
GetPropW
UpdateLayeredWindow
MoveWindow
GetWindowRgn
CharPrevW
IsZoomed
DrawTextW
FillRect
SetRect
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
GetCaretBlinkTime
CreatePopupMenu
HideCaret
DrawIconEx
DestroyIcon
PrivateExtractIconsW
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardLayout
SetForegroundWindow
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
DrawTextA
wsprintfA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
EqualRect
IsWindowEnabled
ClientToScreen
GetCaretPos
SetCaretPos
ShowCaret
gdi32
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
CreatePenIndirect
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetDeviceCaps
SetBitmapBits
CreateRectRgnIndirect
CreateSolidBrush
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
SelectClipRgn
ExtSelectClipRgn
SetBkColor
SetBkMode
GetBitmapBits
SetStretchBltMode
SetTextColor
GetObjectA
MoveToEx
TextOutW
GdiFlush
CreatePatternBrush
RestoreDC
GetTextExtentPointA
StretchBlt
advapi32
CryptReleaseContext
CryptDestroyKey
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
CryptGenRandom
CryptDecrypt
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptExportKey
CryptGetUserKey
LookupAccountSidW
FreeSid
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
OpenProcessToken
GetUserNameW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
CryptSetHashParam
CryptGetProvParam
CryptCreateHash
shell32
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
DragQueryFileW
ShellExecuteExW
ole32
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
ReleaseStgMedium
OleDuplicateData
DoDragDrop
CoTaskMemRealloc
CoCreateInstance
CoInitialize
oleaut32
VariantInit
SysAllocString
VarUI4FromStr
VariantClear
SysFreeString
shlwapi
PathFindFileNameW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveExtensionW
SHDeleteKeyW
PathCombineW
PathIsDirectoryW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ord17
gdiplus
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipSetPenMode
GdipSetInterpolationMode
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeletePen
GdipCreatePen1
GdipLoadImageFromStream
GdipSetTextRenderingHint
GdipDrawImageRectI
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdipDeleteFont
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipCreateSolidFill
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
GdipStringFormatGetGenericTypographic
GdipMeasureString
GdipDrawString
imm32
ImmSetCompositionWindow
ImmGetContext
ImmReleaseContext
crypt32
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertOpenStore
CertFindCertificateInStore
CryptMsgGetParam
CertCloseStore
CertOpenSystemStoreW
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertEnumCertificatesInStore
CryptQueryObject
CertGetNameStringW
CryptMsgClose
CertFreeCertificateContext
ws2_32
getsockopt
getsockname
getpeername
htons
recvfrom
sendto
WSAStartup
gethostname
gethostbyname
ntohs
setsockopt
shutdown
socket
WSASetLastError
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSAEventSelect
WSAIoctl
getnameinfo
WSACleanup
closesocket
recv
send
WSAGetLastError
bind
connect
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
urlmon
ObtainUserAgentString
wldap32
ord147
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
ord46
ord301
ord219
ord145
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 565KB - Virtual size: 564KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ