Static task
static1
Behavioral task
behavioral1
Sample
ea83c3be70c179b90245a9d407697ef662e8540838a71245ca70040a23f9f569.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea83c3be70c179b90245a9d407697ef662e8540838a71245ca70040a23f9f569.exe
Resource
win10v2004-20240802-en
General
-
Target
ea83c3be70c179b90245a9d407697ef662e8540838a71245ca70040a23f9f569
-
Size
244KB
-
MD5
2e3eedc2ff3c998ed0b54092e487fe65
-
SHA1
0b237c3b589782795b618b86a9233a7c071a1d10
-
SHA256
ea83c3be70c179b90245a9d407697ef662e8540838a71245ca70040a23f9f569
-
SHA512
71f1aae7bbb3983e21921d2e2d10ff6338661ac4c03bc9823e42414ebcf54559fcd3d77aca467d110613a7d7d8ec4fedb5337a48043ef1c74a6417878e3a775b
-
SSDEEP
3072:OeO42pLunQxuhYj3I/xzbJ8/w9ZSttE+6PSfEL+TeK2AVItYkvr:VO42p2Qxu2WvieSCPrr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea83c3be70c179b90245a9d407697ef662e8540838a71245ca70040a23f9f569
Files
-
ea83c3be70c179b90245a9d407697ef662e8540838a71245ca70040a23f9f569.exe windows:4 windows x86 arch:x86
f1070a4009f5bfa59b166e0afe980d8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetCommandLineA
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
SetLastError
InterlockedIncrement
lstrcpyA
lstrcatA
InterlockedDecrement
GlobalFlags
MulDiv
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LCMapStringW
VirtualAlloc
HeapAlloc
HeapReAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
HeapFree
IsBadReadPtr
GetModuleFileNameA
Sleep
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
FindFirstFileA
GetLocalTime
GetPrivateProfileStringA
WritePrivateProfileStringA
CloseHandle
WriteFile
CreateFileA
CreateProcessA
GetStartupInfoA
GetTickCount
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
IsBadCodePtr
MoveFileExA
IsWow64Process
WaitForSingleObject
GetProcessHeap
GetModuleHandleA
ExitProcess
SetStdHandle
ole32
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
CoUninitialize
OleFlushClipboard
CLSIDFromProgID
OleIsCurrentClipboard
CoInitialize
CLSIDFromString
CoCreateInstance
OleRun
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
iphlpapi
SendARP
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
InternetOpenA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
user32
AdjustWindowRectEx
IsWindow
CallNextHookEx
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
GetClientRect
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
gdi32
PtVisible
GetDeviceCaps
ExtTextOutA
RectVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
Escape
GetObjectA
TextOutA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
VarR8FromCy
VarR8FromBool
LoadTypeLi
shlwapi
PathFileExistsA
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE