Static task
static1
Behavioral task
behavioral1
Sample
e730ad7f51b7b22defc4013b0f354fc354a89ae8c0aab16d62d8cdb2629aeaa5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e730ad7f51b7b22defc4013b0f354fc354a89ae8c0aab16d62d8cdb2629aeaa5.exe
Resource
win10v2004-20240802-en
General
-
Target
e730ad7f51b7b22defc4013b0f354fc354a89ae8c0aab16d62d8cdb2629aeaa5
-
Size
278KB
-
MD5
c5cb423d2ac51d76d4fc3febbdc26afc
-
SHA1
d89172ece7b55d737809e53c45a8f6f0bce07c9d
-
SHA256
e730ad7f51b7b22defc4013b0f354fc354a89ae8c0aab16d62d8cdb2629aeaa5
-
SHA512
82f03b542db8e051a3ddf4b156674da0c628a77ddf44678048fb66d5e39b5c9cee14834858f78b998bbd40f526b66e89a7a786c0c8b5b8fe8f53632d06733294
-
SSDEEP
3072:dHLAlPMpf3nQMpC29Vc8dQ6GV/4RayH/e8ANYGBIjMKItcD+EoanG:drAlPApbXcV/47/7KTRgn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e730ad7f51b7b22defc4013b0f354fc354a89ae8c0aab16d62d8cdb2629aeaa5
Files
-
e730ad7f51b7b22defc4013b0f354fc354a89ae8c0aab16d62d8cdb2629aeaa5.exe windows:5 windows x86 arch:x86
ab139552d86057cbb44d5de59ba415c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SearchPathW
GetNumaProcessorNode
GetConsoleAliasExesLengthA
InterlockedIncrement
OpenJobObjectA
QueryDosDeviceA
CallNamedPipeW
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetPriorityClass
GetEnvironmentStrings
LoadLibraryW
GetConsoleMode
Sleep
CopyFileW
WriteConsoleOutputA
HeapDestroy
GetFileAttributesA
GlobalFlags
GetBinaryTypeA
GetModuleFileNameW
GetStartupInfoW
DisconnectNamedPipe
CreateDirectoryA
GetCommandLineW
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
BuildCommDCBW
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
WritePrivateProfileStringA
FoldStringA
GetModuleFileNameA
GetDefaultCommConfigA
SetConsoleTitleW
WaitForDebugEvent
GetShortPathNameW
SetCalendarInfoA
FindAtomW
GlobalReAlloc
SetFileAttributesW
CopyFileExA
GetVolumeInformationW
WriteConsoleW
CloseHandle
GetConsoleAliasesW
DebugActiveProcess
HeapAlloc
EncodePointer
DecodePointer
MultiByteToWideChar
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
HeapCreate
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapSize
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
ReadFile
RtlUnwind
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
GetConsoleCP
FlushFileBuffers
SetFilePointer
IsProcessorFeaturePresent
CreateFileW
user32
GetUserObjectInformationA
advapi32
RegCreateKeyA
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ