Static task
static1
Behavioral task
behavioral1
Sample
e6d07a678b3f8b89eec5285a65dbe6e2d45d2963605ba457023f5a32327aa108.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e6d07a678b3f8b89eec5285a65dbe6e2d45d2963605ba457023f5a32327aa108.exe
Resource
win10v2004-20240802-en
General
-
Target
e6d07a678b3f8b89eec5285a65dbe6e2d45d2963605ba457023f5a32327aa108
-
Size
2.4MB
-
MD5
12b68bcd2299895d7ed8c1d38ac9d602
-
SHA1
f7f97419b3d6f6fbf0c15e1896b695c5346d4b86
-
SHA256
e6d07a678b3f8b89eec5285a65dbe6e2d45d2963605ba457023f5a32327aa108
-
SHA512
f80fed59113ec230083e5408a16c786b80ab46ac492fd0cc0d14d5e29e43660fa203d5303b4ac78c3f6c71c6009e6066ab595f5a2b6e4736df0ec72b8487b9ff
-
SSDEEP
49152:3XV8cLN5s9kDFEl7YoxKWypsWxc0PHbAy9zLTVoF:5NO9kDOl7YoxZyp5CybPTV0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6d07a678b3f8b89eec5285a65dbe6e2d45d2963605ba457023f5a32327aa108
Files
-
e6d07a678b3f8b89eec5285a65dbe6e2d45d2963605ba457023f5a32327aa108.exe windows:5 windows x64 arch:x64
ad14f7cdbdb05418f8ad833666940ef1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
VariantClear
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
ole32
CoCreateInstance
CoUninitialize
CoInitialize
OleInitialize
user32
GetFocus
EndDialog
SetDlgItemTextW
GetKeyState
EnableWindow
PostMessageW
SetFocus
InvalidateRect
SetWindowTextW
MessageBoxW
DialogBoxParamW
SystemParametersInfoW
CheckDlgButton
MonitorFromWindow
MapDialogRect
GetDlgItem
GetWindowLongPtrW
SetWindowLongPtrW
ShowWindow
MoveWindow
ScreenToClient
GetWindowRect
GetParent
GetWindowTextW
GetWindowTextLengthW
SendMessageW
LoadStringW
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharUpperW
SetCursor
LoadCursorW
LoadIconW
KillTimer
SetTimer
IsDlgButtonChecked
GetMonitorInfoA
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
kernel32
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapSize
GetStringTypeW
SetStdHandle
GetFileType
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapAlloc
HeapReAlloc
HeapFree
TerminateProcess
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetProcAddress
LoadLibraryW
FreeLibrary
GetCommandLineW
MultiByteToWideChar
GetLastError
WideCharToMultiByte
GlobalLock
GlobalUnlock
LoadLibraryExW
GetModuleFileNameW
FormatMessageW
LocalFree
GetSystemDirectoryW
CreateFileW
SetFileTime
CloseHandle
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetLastError
GetCurrentDirectoryW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetFileInformationByHandle
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetLogicalDriveStringsW
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GlobalAlloc
GlobalFree
CompareFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcess
GetProcessAffinityMask
GetSystemInfo
GlobalMemoryStatusEx
GetStdHandle
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
Sleep
SetPriorityClass
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
lstrlenW
GetVersionExW
lstrcatW
ReleaseSemaphore
InitializeCriticalSection
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
Sections
.text Size: 317KB - Virtual size: 317KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ