Static task
static1
Behavioral task
behavioral1
Sample
e1a098fc39f8b56d1a072971e811a568c9a71c233234dbcc87e0650934acc9cf.exe
Resource
win7-20240708-en
General
-
Target
e1a098fc39f8b56d1a072971e811a568c9a71c233234dbcc87e0650934acc9cf.exe
-
Size
476KB
-
MD5
b835f01cfb7d3499a14ba6b3aceabd80
-
SHA1
27fb25e9ff470606dab27c12fb019d43d8398cae
-
SHA256
e1a098fc39f8b56d1a072971e811a568c9a71c233234dbcc87e0650934acc9cf
-
SHA512
96e801d614c967cd918ae0074952691b3c1869ce0a3dceffb90ee8985f4b9c4b6017a3ea27a12d586466c13ddabc04d23bc59927e0504c43a661187b77c6f2eb
-
SSDEEP
12288:yJM5Qxkxmj3kHajiys0fdcXY0wHvTvLn7ZHONT:yqvxmAHepL0wP/nQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1a098fc39f8b56d1a072971e811a568c9a71c233234dbcc87e0650934acc9cf.exe
Files
-
e1a098fc39f8b56d1a072971e811a568c9a71c233234dbcc87e0650934acc9cf.exe.exe windows:4 windows x86 arch:x86
57bc1bbdbbd8ee647e691e6f347f3c2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CloseHandle
LCMapStringA
InterlockedExchange
GetACP
GetLocaleInfoA
DeleteCriticalSection
VirtualAlloc
SetThreadIdealProcessor
QueryPerformanceCounter
GetStringTypeW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleHandleA
GetCommandLineA
VirtualProtect
GetSystemTimeAsFileTime
LeaveCriticalSection
GetThreadPriorityBoost
TlsSetValue
lstrlenA
InterlockedDecrement
GetStartupInfoA
HeapFree
MoveFileW
CompareStringA
GlobalSize
CreateMutexA
OpenMutexA
GetSystemInfo
FlushFileBuffers
GetEnvironmentStrings
InitializeCriticalSection
GetDateFormatA
GetTempPathA
RtlUnwind
TerminateProcess
SetEnvironmentVariableA
GetCurrentThread
GetCurrentProcessId
LoadLibraryA
VirtualQuery
GetVersionExA
SetFilePointer
GetModuleFileNameA
TlsFree
IsBadWritePtr
IsValidLocale
GetStringTypeA
IsValidCodePage
MultiByteToWideChar
TlsGetValue
HeapCreate
EnterCriticalSection
GetTickCount
CompareStringW
HeapDestroy
ReadFile
SetStdHandle
GetStartupInfoW
SetConsoleActiveScreenBuffer
LocalReAlloc
UnhandledExceptionFilter
GetStdHandle
GetCommandLineW
GetModuleFileNameW
GetCurrentProcess
SystemTimeToFileTime
HeapSize
SetHandleCount
GetTimeZoneInformation
GetOEMCP
FreeEnvironmentStringsA
GetLastError
WriteFile
GetCPInfo
GetUserDefaultLCID
VirtualFree
LCMapStringW
GetTimeFormatA
GetProcAddress
GetEnvironmentStringsW
GetLocaleInfoW
GetFileType
HeapAlloc
TlsAlloc
SetLastError
EnumSystemLocalesA
HeapReAlloc
GetCurrentThreadId
FillConsoleOutputCharacterW
advapi32
RegEnumKeyA
RegLoadKeyW
RegEnumKeyW
RevertToSelf
InitializeSecurityDescriptor
RegEnumValueA
RegOpenKeyExA
CryptAcquireContextW
RegReplaceKeyW
ReportEventA
comctl32
ImageList_Duplicate
DrawInsert
ImageList_SetImageCount
InitCommonControlsEx
ImageList_Write
GetEffectiveClientRect
ImageList_Merge
ImageList_GetIconSize
user32
InternalGetWindowText
GetClipboardFormatNameA
ExitWindowsEx
LoadCursorFromFileW
GetMenuDefaultItem
CreateWindowExW
SetActiveWindow
SetSysColors
RegisterClassA
RegisterClassExA
SetWinEventHook
ShowWindow
MessageBoxW
DestroyWindow
CreateDesktopA
MessageBoxA
DestroyAcceleratorTable
CallWindowProcW
DefWindowProcW
EnumWindows
CharUpperA
ShowCaret
DialogBoxParamA
PackDDElParam
ScrollWindow
comdlg32
ChooseFontW
ChooseFontA
GetOpenFileNameA
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 257KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
dW�k�u% Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE