Static task
static1
Behavioral task
behavioral1
Sample
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
Resource
win10v2004-20241007-en
General
-
Target
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
-
Size
146KB
-
MD5
521666a43aeb19e91e7df9a3f9fe76ba
-
SHA1
663081e2767df7083f765a3a8a994982959d4cbe
-
SHA256
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd
-
SHA512
cd1414158094328ee2f56a995ee4724604f05c0df5a08f4ae1c653e19cb0158a58ffa2cafc3a2363fc13ef617320979e11bc6281c4c79066a6787c0545c6ec54
-
SSDEEP
3072:S4PDTrekAooSPxQQvYO3ppr4nwd/T7YfeJFDGfYfaPLmy816SX:SOrNAmPiUprWKTMferDGmaP17SX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
Files
-
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe.exe windows:6 windows x86 arch:x86
c50789e412500751ed39ba121d367ba5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetConsoleWindow
SetConsoleCursorPosition
AllocConsole
GetLogicalDrives
FindFirstFileW
GetFileSizeEx
FindFirstVolumeW
FindNextFileW
GetFinalPathNameByHandleW
WaitForMultipleObjects
SetThreadPriority
GetQueuedCompletionStatus
lstrlenA
FindClose
PostQueuedCompletionStatus
SetFileAttributesW
GetCurrentThread
GetSystemInfo
LoadLibraryW
CreateThread
ExitProcess
GetStdHandle
LocalFree
MoveFileExW
FindVolumeClose
GetCurrentProcessId
SetThreadExecutionState
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
CreateIoCompletionPort
GetDriveTypeW
HeapCreate
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
LCMapStringW
CompareStringW
GetProcAddress
WriteConsoleW
ScrollConsoleScreenBufferW
GetNativeSystemInfo
GetLastError
Sleep
OpenProcess
ReleaseMutex
WaitForSingleObject
CreateMutexW
SetProcessShutdownParameters
SetVolumeMountPointW
TerminateProcess
GetCurrentProcess
GetCommandLineW
SetPriorityClass
GetConsoleScreenBufferInfo
ReadFile
DeleteCriticalSection
GetLocalTime
CloseHandle
lstrcatW
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
lstrlenW
SetFilePointerEx
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetCommandLineA
GetModuleHandleExW
RaiseException
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
DecodePointer
user32
ShowWindow
wsprintfA
wsprintfW
advapi32
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetFolderPathW
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
VariantInit
rstrtmgr
RmGetList
RmRegisterResources
RmStartSession
RmEndSession
shlwapi
PathRemoveFileSpecW
StrStrIW
PathFindExtensionW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ