Static task
static1
Behavioral task
behavioral1
Sample
e0cb3bc4b6f0ccbaa96b15657f0a5fc827542b50ba6a202236c82b3f995f53f8.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
e0cb3bc4b6f0ccbaa96b15657f0a5fc827542b50ba6a202236c82b3f995f53f8.exe
Resource
win11-20240802-en
General
-
Target
e0cb3bc4b6f0ccbaa96b15657f0a5fc827542b50ba6a202236c82b3f995f53f8
-
Size
629KB
-
MD5
dfe6195ca0c2f736cbd53edb94b1e889
-
SHA1
1d07a85ec72cfcf5fb5dec5f6199b9b503e8e34a
-
SHA256
e0cb3bc4b6f0ccbaa96b15657f0a5fc827542b50ba6a202236c82b3f995f53f8
-
SHA512
4b68b937751090f4ba5e6274b282b6663b4800d3e561008a8dbd037dbefb2570d5ae8efc4485fd25a83cbcb43ecf64e2678210c9ded50388a6f624c2c00c1129
-
SSDEEP
12288:+bbZlgh5aQ4DgVl52BJl+jaibGIM83Dxp5hp6fzDOE4:K8Xz+JJXIN3xK6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0cb3bc4b6f0ccbaa96b15657f0a5fc827542b50ba6a202236c82b3f995f53f8
Files
-
e0cb3bc4b6f0ccbaa96b15657f0a5fc827542b50ba6a202236c82b3f995f53f8.exe windows:5 windows x86 arch:x86
e12f86c88c10a6fbfc55bcaf7131e9a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CommConfigDialogA
SetConsoleTextAttribute
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesLengthA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetConsoleAliasW
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
CreateFileA
InterlockedExchangeAdd
CreateFileMappingW
IsSystemResumeAutomatic
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
ReadFile
GetProcessHeap
SetEndOfFile
HeapSize
GetStringTypeW
LoadLibraryA
EnumResourceNamesW
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
SetStdHandle
CreateFileW
HeapAlloc
HeapReAlloc
GetCommandLineW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
WideCharToMultiByte
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
WriteFile
GetModuleFileNameW
RtlUnwind
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RaiseException
user32
GetComboBoxInfo
SetClipboardViewer
GetCaretPos
CharUpperBuffW
ChangeMenuW
GetMenuState
GetDC
GetSysColorBrush
gdi32
GetCharABCWidthsI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 470KB - Virtual size: 470KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dukav Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rehodic Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ