Static task
static1
Behavioral task
behavioral1
Sample
e662e42ec999d65df23ff9a816dfa5ab815fe025cb1faa29d707a34eaf3b959e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e662e42ec999d65df23ff9a816dfa5ab815fe025cb1faa29d707a34eaf3b959e.exe
Resource
win10v2004-20240704-en
General
-
Target
e662e42ec999d65df23ff9a816dfa5ab815fe025cb1faa29d707a34eaf3b959e
-
Size
464KB
-
MD5
e9b0b2ea2dc652fb8feda91726782303
-
SHA1
5f6ab72edc27d1acad8e240481bd663b136fc4d0
-
SHA256
e662e42ec999d65df23ff9a816dfa5ab815fe025cb1faa29d707a34eaf3b959e
-
SHA512
d4c2cf53588e4e5bae6d47f8b050f4bd18008ee0fdb32b30f962e84e4f06cd8a8037ef474a3a18bc0626c19635c38064f3d86c8f381b2db29f1e597b9b057e40
-
SSDEEP
12288:rrqLTOKzlAUsX6W/eQ07TzeFaZabk2VvJeLnA:KnO07neFWahNJe7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e662e42ec999d65df23ff9a816dfa5ab815fe025cb1faa29d707a34eaf3b959e
Files
-
e662e42ec999d65df23ff9a816dfa5ab815fe025cb1faa29d707a34eaf3b959e.exe windows:5 windows x86 arch:x86
74ecc6984bb7d58f68df2ce9a97b8860
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoA
kernel32
GetFileSize
FlushFileBuffers
GetProcessAffinityMask
GetCurrentProcess
CreateFileA
LoadLibraryA
FileTimeToSystemTime
DuplicateHandle
GetCurrentThread
WaitForSingleObject
GetCurrentProcessId
GetLongPathNameW
FindClose
FindNextFileW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
GetFullPathNameW
CreateFileW
CreateDirectoryW
CreateDirectoryExW
GetExitCodeThread
GetFileAttributesExW
GetFileAttributesW
GetModuleHandleA
FindFirstFileW
CopyFileW
SetFileAttributesW
DeleteFileW
MoveFileExW
RemoveDirectoryW
GetTempPathW
GetVolumeInformationW
SetErrorMode
GetFileInformationByHandle
GetShortPathNameW
GetCurrentDirectoryW
GetLocaleInfoA
FindFirstFileA
GetExitCodeProcess
DeviceIoControl
SetNamedPipeHandleState
SetHandleInformation
CreatePipe
GetProcessId
ResumeThread
CreateProcessW
GetCommandLineW
GetLocalTime
GetTimeFormatW
GetDateFormatW
GetModuleHandleW
GetLogicalDrives
ReleaseSemaphore
SetEndOfFile
SetFileTime
OpenThread
GlobalFree
GlobalAlloc
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
HeapCreate
HeapReAlloc
LCMapStringW
LCMapStringA
GetStdHandle
RaiseException
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
GetFileAttributesA
GetSystemTimeAsFileTime
RtlUnwind
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
GetSystemInfo
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OutputDebugStringA
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
DeleteCriticalSection
GetSystemDirectoryA
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
Sleep
InitializeCriticalSection
FormatMessageW
LocalFree
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
FreeResource
MulDiv
GetModuleFileNameA
WriteFile
GetLastError
CloseHandle
CreateThread
VirtualAlloc
VirtualFree
GetVersion
GetModuleFileNameW
GetVersionExA
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
OpenSemaphoreW
SetEnvironmentVariableA
user32
GetMenuState
ModifyMenuW
GetWindowTextW
GetWindowTextLengthW
PeekMessageA
TranslateMessage
DispatchMessageW
GetMenuItemInfoW
SetCursor
GetWindowTextA
ExitWindowsEx
KillTimer
SetTimer
LoadMenuA
GetSubMenu
SetClassLongW
SetWindowLongW
GetWindowLongW
MessageBoxW
EnumWindows
GetWindowThreadProcessId
FlashWindowEx
GetDlgItemTextW
LoadStringA
LoadStringW
FindWindowExA
FindWindowW
LoadCursorA
RemoveMenu
DestroyMenu
GetClassNameA
DrawIcon
GetDlgCtrlID
GetCursorPos
MoveWindow
EnumDisplayMonitors
GetSystemMetrics
CreateDialogParamA
DialogBoxIndirectParamW
DialogBoxParamA
CallWindowProcW
EnumChildWindows
SystemParametersInfoA
DrawTextW
LoadImageA
GetSysColorBrush
GetClientRect
GetDC
ReleaseDC
GetSysColor
FillRect
GetMenuItemCount
GetMenuItemID
MessageBoxA
IsIconic
PostQuitMessage
GetWindowRect
MapWindowPoints
SetFocus
ShowWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
PostMessageA
EnableWindow
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextW
SendMessageW
SendMessageA
GetParent
EndDialog
BeginPaint
EndPaint
GetDlgItem
SetWindowTextW
LoadIconA
IsWindow
DestroyWindow
GetDesktopWindow
CreateDialogIndirectParamW
gdi32
CreateSolidBrush
GetBkMode
SetBkMode
SelectObject
CreateFontA
GetDeviceCaps
DeleteObject
DeleteDC
CreatePatternBrush
CreateCompatibleBitmap
CreateCompatibleDC
SetBrushOrgEx
ExtTextOutW
BitBlt
CreateFontIndirectA
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegOpenKeyA
RegQueryInfoKeyA
RegEnumValueW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyW
SetThreadToken
DecryptFileW
RegDeleteValueW
RegEnumKeyExW
ImpersonateNamedPipeClient
RevertToSelf
OpenThreadToken
DuplicateTokenEx
RegDeleteValueA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
AdjustTokenPrivileges
shell32
ShellExecuteExW
SHGetFolderLocation
SHGetFileInfoW
ord155
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ord28
SHCreateShellItem
SHGetSpecialFolderPathA
ShellExecuteW
SHGetDesktopFolder
ole32
CoCreateInstance
CoTaskMemFree
Sections
.text Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ