Static task
static1
Behavioral task
behavioral1
Sample
e6639858a9d2a1fb40489e9d89ad5050N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6639858a9d2a1fb40489e9d89ad5050N.exe
Resource
win10v2004-20240802-en
General
-
Target
e6639858a9d2a1fb40489e9d89ad5050N.exe
-
Size
203KB
-
MD5
e6639858a9d2a1fb40489e9d89ad5050
-
SHA1
1a405c7b059cfff53bece26d57f29ab1249e7fee
-
SHA256
f3694358f9a5cc80da7f8d88cc63ae45496c98276d0079b6d23f5e0b3be16358
-
SHA512
acb244f7997c2ff83073b1d28abf029809650ecf3d42aa1453624f257817644ccdc69836d1bcdcb1402ebc68c08b4c920461fe0023cb3190c833a6377a4a2892
-
SSDEEP
6144:QEL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:ZnksHxyXcfIRhFE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6639858a9d2a1fb40489e9d89ad5050N.exe
Files
-
e6639858a9d2a1fb40489e9d89ad5050N.exe.exe windows:4 windows x86 arch:x86
dec3dee9869bb0d71498fbbf0d597bb9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
MoveFileW
GetLogicalDrives
WinExec
SearchPathW
GetACP
GetModuleHandleA
CreateDirectoryW
CompareStringA
GetEnvironmentStringsA
lstrcmpA
ExpandEnvironmentStringsA
SuspendThread
lstrcmpi
GetHandleInformation
lstrcatA
GetStringTypeW
CreateSemaphoreA
GetProcAddress
EnumTimeFormatsA
GetSystemDefaultLCID
GetNamedPipeInfo
GetCurrentThreadId
GetNumberFormatA
IsBadStringPtrA
GetModuleFileNameA
user32
DrawTextW
GetMessageW
OffsetRect
DialogBoxParamA
SendMessageW
CreateDialogIndirectParamW
LoadBitmapA
SetForegroundWindow
GetDlgItem
MonitorFromPoint
FindWindowW
WaitForInputIdle
CreateWindowExA
MoveWindow
SetWindowTextA
CharUpperA
GetDC
UpdateWindow
UnregisterClassA
GetKeyboardType
ShowWindow
GetClassInfoW
RegisterClassExW
CharNextA
CreateWindowExW
IsDlgButtonChecked
mouse_event
PostMessageA
RegisterClassExA
SetCursorPos
GetMenuItemInfoA
wvsprintfA
CharUpperW
GetCursorPos
GetSystemMetrics
CreateDialogParamA
GetIconInfo
ArrangeIconicWindows
DefWindowProcW
GetClassNameW
GetClassInfoExA
gdi32
BitBlt
GetTextMetricsW
CreateMetaFileW
GetEnhMetaFileA
CreateMetaFileA
EnumFontFamiliesExA
ResizePalette
FlattenPath
CreateFontIndirectW
OffsetClipRgn
GetCharABCWidthsI
SetMapperFlags
RestoreDC
TranslateCharsetInfo
SetBrushOrgEx
GetEnhMetaFileDescriptionA
PtInRegion
advapi32
RegQueryValueW
RegSaveKeyW
RegOpenKeyW
RegRestoreKeyW
RegFlushKey
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueW
RegCreateKeyExW
shlwapi
PathParseIconLocationW
UrlGetLocationW
PathFileExistsW
AssocQueryStringA
UrlCreateFromPathW
PathUndecorateA
StrCmpNIA
PathIsFileSpecW
Sections
.qtJ Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tc Size: 3KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VXtI Size: 3KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.B Size: 4KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 103KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.M Size: 4KB - Virtual size: 479KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ