Static task
static1
Behavioral task
behavioral1
Sample
eead7a529f768cd0a74a639ff806357c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eead7a529f768cd0a74a639ff806357c.exe
Resource
win10v2004-20240802-en
General
-
Target
eead7a529f768cd0a74a639ff806357c.exe
-
Size
361KB
-
MD5
eead7a529f768cd0a74a639ff806357c
-
SHA1
5fea9c1f649f81dfca7f19af1cabc8aab2b01829
-
SHA256
2c84b412d0ab9a058d88e5b34e0921c06da1ba11703ef71c124050406dad1844
-
SHA512
dd28fb4dcbba20b72e7fb36c2d947a99a8dffe76d52460d52143992aa98bf0c7ee41cfa9e59fb7d0a7ca3c598b0924254e9764168f5f8031f3bb920f60d562e5
-
SSDEEP
6144:o1JYtwjCacpD0fbtNorAJoKURDOT42P12YO5LqxuGG8eskEGtwc:Ui2jCacpofbtNRJoSHbkGVGtw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eead7a529f768cd0a74a639ff806357c.exe
Files
-
eead7a529f768cd0a74a639ff806357c.exe.exe windows:5 windows x86 arch:x86
ff383ac4deafd0aa2c692d1185588d4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalCompact
InterlockedIncrement
GetCurrentProcess
GetLogicalDriveStringsW
CreateJobObjectW
InterlockedCompareExchange
SetVolumeMountPointW
GetTimeFormatA
_lcreat
GetModuleHandleW
SetFileTime
ClearCommBreak
GetConsoleAliasExesW
CreateActCtxW
LoadLibraryW
CopyFileW
_hread
GetCalendarInfoW
CreateEventA
GetFileAttributesW
VerifyVersionInfoA
GetModuleFileNameW
GetEnvironmentVariableA
GetTempPathW
InterlockedExchange
GlobalUnfix
GetStdHandle
GetLastError
GetProcAddress
CreateNamedPipeA
CommConfigDialogA
EnumSystemCodePagesW
SetComputerNameA
GlobalFree
GetTempFileNameA
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
CreateHardLinkW
GetNumberFormatW
OpenEventA
QueryDosDeviceW
FoldStringA
SetEnvironmentVariableA
EnumDateFormatsA
GetCurrentDirectoryA
GetShortPathNameW
SetCalendarInfoA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExA
GetVersionExA
ReadConsoleInputW
DebugBreak
SetFileAttributesW
LCMapStringW
GetLocaleInfoA
TlsGetValue
SetFilePointer
EnumCalendarInfoA
GetComputerNameA
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
gdi32
GetCharWidthI
GetBkMode
CreateDCW
GetCharWidth32A
GetCharABCWidthsI
winhttp
WinHttpCloseHandle
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ