Static task
static1
Behavioral task
behavioral1
Sample
0e5a7acd4d981c5cda31204384cd5260N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e5a7acd4d981c5cda31204384cd5260N.exe
Resource
win10v2004-20240802-en
General
-
Target
0e5a7acd4d981c5cda31204384cd5260N.exe
-
Size
9.6MB
-
MD5
0e5a7acd4d981c5cda31204384cd5260
-
SHA1
b78d495c8e9a5f0bd522b7566698ef38537838d2
-
SHA256
52c0e79bc59179ba670cfb954e22ae88bff1d8fd4b2a3349fb45c9693847f14f
-
SHA512
7869138d921178ecc62f82017d04a101af158b67b33cb1937ed2f37b2da38d948aafbc088893182bb2475303fa77a3fd6c0e2da6b7ab148c2b08ea0b5626e845
-
SSDEEP
196608:82qnhgJuP3LAhCiVXOWvRyYA1oMuWr45hrr2l:MS+LJPeJWGhrr2l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e5a7acd4d981c5cda31204384cd5260N.exe
Files
-
0e5a7acd4d981c5cda31204384cd5260N.exe.exe windows:5 windows x86 arch:x86
6013d0b9fb6901d1d5e58a9ae7072103
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetTempFileNameA
CreateFileA
lstrcpyA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetVolumeInformationA
GetDriveTypeA
lstrcpynA
WaitForSingleObject
CreateMutexA
Thread32Next
SuspendThread
ResumeThread
OpenThread
Thread32First
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
CreateDirectoryA
GetTempPathA
DeleteFileA
FreeResource
UpdateResourceA
LockResource
LoadResource
SizeofResource
FindResourceExA
EnumResourceLanguagesA
EnumResourceNamesA
SetFileTime
GetFileTime
FreeLibrary
FindResourceA
LoadLibraryExA
GetCurrentProcess
SetEvent
OpenEventA
Process32Next
Process32First
FindClose
FindNextFileA
FindFirstFileA
EndUpdateResourceA
EnumResourceTypesA
BeginUpdateResourceA
GetTickCount
CopyFileA
ReleaseMutex
lstrlenA
lstrcatA
WriteFile
GetModuleFileNameA
CreateProcessA
CloseHandle
Sleep
GetLastError
HeapSize
GetLocaleInfoA
GetUserDefaultLCID
CreateThread
FlushFileBuffers
SetStdHandle
GetConsoleMode
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetFullPathNameA
GetCurrentThread
WideCharToMultiByte
GetModuleHandleA
GetVersionExA
lstrcmpA
SetFilePointer
GetSystemTimeAsFileTime
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
HeapFree
GetProcessHeap
InterlockedIncrement
InterlockedDecrement
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
IsValidCodePage
GetStdHandle
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
VirtualAlloc
HeapReAlloc
ReadFile
GetConsoleCP
user32
wsprintfA
wvsprintfA
advapi32
RegQueryValueExA
RegCreateKeyA
RegEnumKeyExA
FreeSid
AllocateAndInitializeSid
EqualSid
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
OpenThreadToken
GetTokenInformation
shell32
ShellExecuteA
SHGetSpecialFolderPathA
shlwapi
SHRegCreateUSKeyA
SHRegCloseUSKey
wininet
InternetCloseHandle
HttpOpenRequestA
InternetOpenA
InternetConnectA
InternetQueryOptionA
HttpQueryInfoA
InternetOpenUrlA
InternetSetFilePointer
HttpSendRequestA
InternetReadFile
ws2_32
WSAStartup
gethostbyname
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9.4MB - Virtual size: 9.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ