Static task
static1
Behavioral task
behavioral1
Sample
e73e80fb1603b44dddfa19c5534a0bf4ab297b86f230d465ad0ef47a5b502996.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e73e80fb1603b44dddfa19c5534a0bf4ab297b86f230d465ad0ef47a5b502996.exe
Resource
win10v2004-20241007-en
General
-
Target
e73e80fb1603b44dddfa19c5534a0bf4ab297b86f230d465ad0ef47a5b502996.exe
-
Size
434KB
-
MD5
69f47e61ff53249611bc6f1e9dc9e311
-
SHA1
957cc40f099525b217046b2aecce1562d2293827
-
SHA256
e73e80fb1603b44dddfa19c5534a0bf4ab297b86f230d465ad0ef47a5b502996
-
SHA512
c0bbd97f9fd0300f037689eb6da93f6b2a0f15da03d3350f937def0025338ee58ef157ebc0ac2af8a4cc2e9a96fcf1e44a16c80d11a974c3595b1a7063193986
-
SSDEEP
3072:nAXzvD1L2xljciSKSeVf9yoR0aJfZAUl7hLwZGsiIHAFeJs4YpLxdB5S+XTCLagL:0v1LulI2L9/JPphhwA8C4Y1K+DCL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e73e80fb1603b44dddfa19c5534a0bf4ab297b86f230d465ad0ef47a5b502996.exe
Files
-
e73e80fb1603b44dddfa19c5534a0bf4ab297b86f230d465ad0ef47a5b502996.exe.exe windows:5 windows x86 arch:x86
6cddbd6e3677a524b45cc971d959c013
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
SetComputerNameW
GetComputerNameW
GetTimeFormatA
CreateNamedPipeW
GetCurrencyFormatA
GetConsoleAliasExesW
EnumTimeFormatsW
TlsSetValue
GetEnvironmentStrings
SetFileShortNameW
GetLocaleInfoW
GetCalendarInfoW
SetVolumeMountPointA
GetFileAttributesA
CreateSemaphoreA
GetModuleFileNameW
CreateActCtxA
GetShortPathNameA
CreateJobObjectA
VerifyVersionInfoW
InterlockedExchange
GetLogicalDriveStringsA
ClearCommError
GetCurrentDirectoryW
SetLastError
GetProcAddress
EnumSystemCodePagesW
DefineDosDeviceA
FindClose
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
CreateHardLinkW
GetNumberFormatW
GetCommMask
FoldStringA
EnumDateFormatsA
GlobalUnWire
OpenEventW
GetShortPathNameW
GetDiskFreeSpaceExA
GetVersionExA
ReadConsoleInputW
GetTempPathA
LocalFree
SetFileAttributesW
LCMapStringW
CreateProcessW
CommConfigDialogA
GetLastError
GlobalCompact
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
HeapFree
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapSize
SetFilePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
GetModuleHandleA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CloseHandle
gdi32
CreateDCA
GetCharWidth32A
GetCharWidthI
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.beko Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lowik Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ