Static task
static1
Behavioral task
behavioral1
Sample
e0a4da525993f6da9542b65dacc154cc9c2bf51c258e526054f10bc0c075a240.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0a4da525993f6da9542b65dacc154cc9c2bf51c258e526054f10bc0c075a240.exe
Resource
win10v2004-20240802-en
General
-
Target
e0a4da525993f6da9542b65dacc154cc9c2bf51c258e526054f10bc0c075a240
-
Size
127KB
-
MD5
1113e6275c617c4dab24f4655b89764b
-
SHA1
a8a3a0ff8d33803721ee4c06d12f279869ab9ab6
-
SHA256
e0a4da525993f6da9542b65dacc154cc9c2bf51c258e526054f10bc0c075a240
-
SHA512
a9693104797cba487475e1f965d7f6041d0d8272bbae2b3925a6184e28a88a0b703808ba0bfe81c7ac4f841670b25576b9ee497a931080502a3f6a2721b4271b
-
SSDEEP
3072:PCbERVrQv/+o+iTe7gcPa1v4zh/6xVxJA3ytz9KDk99y7dYSQMw5D:aCY0i4gcUvIGHPz9byWFf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0a4da525993f6da9542b65dacc154cc9c2bf51c258e526054f10bc0c075a240
Files
-
e0a4da525993f6da9542b65dacc154cc9c2bf51c258e526054f10bc0c075a240.exe windows:4 windows x86 arch:x86
9e84962ad4944b0778aabfd660f1d423
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateFileMappingA
GetExitCodeProcess
GetCurrentProcess
InitAtomTable
GetConsoleCP
GetBinaryTypeA
GetProcAddress
GetUserDefaultLangID
FlushViewOfFile
CreateDirectoryExA
FindClose
Sleep
ClearCommError
DeleteFileA
CreateEventA
CreateWaitableTimerA
CreateSemaphoreA
PurgeComm
SizeofResource
OpenEventA
IsValidCodePage
LoadLibraryA
MulDiv
GetConsoleOutputCP
SleepEx
AllocConsole
GetWindowsDirectoryA
WriteFile
GetPrivateProfileSectionA
GetThreadLocale
GetLogicalDrives
WriteProfileStringA
GetCommConfig
WriteProfileSectionA
LocalShrink
HeapCreate
IsBadWritePtr
DefineDosDeviceA
WritePrivateProfileStringA
LoadLibraryExA
GetLogicalDriveStringsA
FreeConsole
GetCommandLineA
GetProcessHeaps
FindResourceA
CommConfigDialogA
GetExitCodeThread
PeekConsoleInputA
GetPriorityClass
FindCloseChangeNotification
ReadConsoleA
WideCharToMultiByte
GetProcessHeap
HeapAlloc
VirtualProtectEx
GetCurrentProcessId
AddAtomA
GetDriveTypeA
GlobalUnWire
VirtualAllocEx
CancelIo
GetCPInfo
GetLastError
ResumeThread
GetCurrentThreadId
GetLocalTime
GetCommTimeouts
IsBadReadPtr
UnlockFile
MapViewOfFile
VirtualQuery
SetFileTime
MoveFileA
FreeLibrary
GetSystemDefaultLCID
UpdateResourceA
HeapValidate
MoveFileExA
LocalFree
GlobalFlags
GetFullPathNameA
FindNextChangeNotification
GetFileSize
GetCommMask
VirtualProtect
CreateMailslotA
OpenSemaphoreA
IsSystemResumeAutomatic
EndUpdateResourceA
HeapReAlloc
DeviceIoControl
GetDiskFreeSpaceExA
FindAtomA
GetLongPathNameA
FlushFileBuffers
GetThreadContext
LocalHandle
GlobalCompact
GetFileTime
GetTickCount
IsBadStringPtrA
GlobalLock
CloseHandle
CopyFileA
GetProfileStringA
GetSystemDefaultUILanguage
GlobalAddAtomA
FoldStringA
SetEvent
WritePrivateProfileSectionA
LockFile
GlobalSize
GetConsoleCursorInfo
OpenMutexA
OpenProcess
GetThreadPriorityBoost
CreateIoCompletionPort
FlushInstructionCache
WaitForSingleObject
CancelWaitableTimer
GetProfileSectionA
WaitForMultipleObjects
GlobalReAlloc
GetProfileIntA
CallNamedPipeA
GetShortPathNameA
GetUserDefaultUILanguage
WritePrivateProfileStructA
LocalCompact
SearchPathA
LocalSize
LocalFlags
ReadProcessMemory
GetLargestConsoleWindowSize
PulseEvent
MultiByteToWideChar
MapViewOfFileEx
GetThreadSelectorEntry
GlobalAlloc
FlushConsoleInputBuffer
GetSystemDefaultLangID
LocalAlloc
GlobalFix
GetModuleHandleA
OutputDebugStringA
ConnectNamedPipe
WaitForMultipleObjectsEx
ResetEvent
BeginUpdateResourceA
GetTempPathA
GetACP
GetProcessWorkingSetSize
DuplicateHandle
QueryPerformanceCounter
GetVersion
ReleaseSemaphore
GetStartupInfoA
msvcrt
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE