Static task
static1
Behavioral task
behavioral1
Sample
e57051c3e3758064f71f0a3329c60f500f66e4479d9ede24b3e8e886f252f81cN.exe
Resource
win7-20240903-en
General
-
Target
e57051c3e3758064f71f0a3329c60f500f66e4479d9ede24b3e8e886f252f81cN.exe
-
Size
148KB
-
MD5
ef9efd9ad48a00f9eb0af8577fafe890
-
SHA1
c080e3efed7254046a55d1dca3907e64acba803c
-
SHA256
e57051c3e3758064f71f0a3329c60f500f66e4479d9ede24b3e8e886f252f81c
-
SHA512
1b214263ae090f9cb96a3128ce4d675f905e0159fabf7ed81fb8868601c617a63b34529acc88421beb4bab8a07d512de1ff8850305ab70170681faa727595fdc
-
SSDEEP
3072:ug8EPTVJrkWX7Rtvt3wTpKuwoqJU1bOum92z2oINa/xx:i4xxw9KVa9ion
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e57051c3e3758064f71f0a3329c60f500f66e4479d9ede24b3e8e886f252f81cN.exe
Files
-
e57051c3e3758064f71f0a3329c60f500f66e4479d9ede24b3e8e886f252f81cN.exe.exe windows:4 windows x86 arch:x86
c596ce9a63a9959c70977134cd40d2cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord324
ord825
ord641
ord4229
ord2818
ord823
ord773
ord2055
ord5600
ord1083
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord561
ord815
ord2514
ord2621
ord1134
ord4376
ord4853
ord3597
ord4234
ord1146
ord1168
ord4160
ord2863
ord2379
ord755
ord470
ord1200
ord2648
ord1576
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord4710
ord4998
ord5265
ord1816
ord860
ord535
ord537
ord540
ord858
ord501
ord800
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
calloc
fclose
fseek
ftell
fwrite
fread
fopen
malloc
_controlfp
_strdup
free
_makepath
_splitpath
_mbscmp
strncpy
strstr
strncmp
sprintf
strrchr
_setmbcp
_strlwr
_itoa
_except_handler3
__CxxFrameHandler
_access
atoi
kernel32
DeleteFileA
lstrlenA
CloseHandle
CreateFileA
CreateDirectoryA
GetModuleFileNameA
WriteFile
GetFullPathNameA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetModuleHandleA
GetStartupInfoA
GetFileAttributesA
user32
GetClientRect
GetSystemMetrics
IsIconic
PostMessageA
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
SendMessageA
wsprintfA
EnableWindow
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
msvcp60
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
wininet
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE