Static task
static1
Behavioral task
behavioral1
Sample
e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c.exe
Resource
win10v2004-20241007-en
General
-
Target
e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c.exe
-
Size
437KB
-
MD5
d0d4805488e7e745515fff2165d3cc05
-
SHA1
0cebec529de0430c9e897f740700b27c043a8552
-
SHA256
e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c
-
SHA512
5a7debe1760fbef5fca9d0a1326f4bcf4336540ffa7956232f0ad380605cd99637af769bca7d0f91bb1c26ffc094968d6471a4427412041ecba7f9fb5b93719c
-
SSDEEP
6144:zwtN955b+GARrBUNLMmAjgRkRXsmZabQTdVjtga4opTT:zuNL5aGyUBMmAjnFZpptLT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c.exe
Files
-
e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c.exe.exe windows:5 windows x86 arch:x86
6e15f2578101cc821c000ba42c1b85a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalCompact
InterlockedIncrement
InterlockedDecrement
SetEnvironmentVariableW
CreateJobObjectW
QueryDosDeviceA
InterlockedCompareExchange
SetVolumeMountPointW
GetComputerNameW
GetTimeFormatA
GetTickCount
CreateNamedPipeW
LocalFlags
GetNumberFormatA
SetFileTime
ClearCommBreak
TlsSetValue
GetEnvironmentStrings
SetFileShortNameW
LoadLibraryW
CopyFileW
_hread
GetCalendarInfoA
SetVolumeMountPointA
GetVersionExW
GetFileAttributesA
GetModuleFileNameW
CreateActCtxA
GetEnvironmentVariableA
GetShortPathNameA
LCMapStringA
GetConsoleAliasExesA
GetStdHandle
GetLogicalDriveStringsA
GetLastError
GetCurrentDirectoryW
GetProcAddress
EnumSystemCodePagesW
SetComputerNameA
SetFileAttributesA
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
CreateHardLinkW
GetNumberFormatW
CreateEventW
OpenEventA
FoldStringW
GlobalWire
EnumDateFormatsW
GetShortPathNameW
SetCalendarInfoA
SetProcessShutdownParameters
GetDiskFreeSpaceExA
ReadConsoleInputW
GetCurrentProcessId
DebugBreak
GetTempPathA
CommConfigDialogW
GetLocaleInfoA
SetFilePointer
VerifyVersionInfoW
EnumCalendarInfoA
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
gdi32
CreateDCW
GetCharWidth32A
GetCharWidthI
winhttp
WinHttpOpen
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gol Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xowujad Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xonag Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ