Static task
static1
Behavioral task
behavioral1
Sample
ebca6bb84af64476018a2ddedd4acaab255714c8e41f810c428e9f416eb060e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ebca6bb84af64476018a2ddedd4acaab255714c8e41f810c428e9f416eb060e8.exe
Resource
win10v2004-20241007-en
General
-
Target
ebca6bb84af64476018a2ddedd4acaab255714c8e41f810c428e9f416eb060e8
-
Size
293KB
-
MD5
696fe1d3769722195e9a143f1ae5f7af
-
SHA1
bb904b969e3d8ec19146656ac89518f4a18a6a86
-
SHA256
ebca6bb84af64476018a2ddedd4acaab255714c8e41f810c428e9f416eb060e8
-
SHA512
6c82526688cf88ba303e2042b54628c9ef373d8971e17f660e91bf802f349735963a39354b207dd2522dad7099a9cb78ed0d1176f62b251f2b5d78aa82f26c44
-
SSDEEP
3072:0WH4XiPzOn/6uz3+zxdcayU8AnriLblSeqZuadd:uuk/r+zxdsU5riLblSeqZuadd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebca6bb84af64476018a2ddedd4acaab255714c8e41f810c428e9f416eb060e8
Files
-
ebca6bb84af64476018a2ddedd4acaab255714c8e41f810c428e9f416eb060e8.exe windows:4 windows x64 arch:x64
d9a8316935a19e16438421f384fd99bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegGetValueW
RegOpenKeyW
RegQueryValueExW
RegSetValueExA
RegSetValueExW
gdi32
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
DeleteDC
DeleteObject
GetDeviceCaps
GetTextExtentPointA
GetTextExtentPointW
GetTextMetricsW
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DelayLoadFailureHook
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FreeLibrary
GetCommandLineW
GetFullPathNameW
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetStartupInfoW
GetTickCount
HeapAlloc
HeapReAlloc
InitializeCriticalSectionEx
IsBadStringPtrA
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
ReadDirectoryChangesW
ResolveDelayLoadedAPI
SetThreadDescription
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiW
ntdll
_vsnprintf
rpcrt4
UuidCreate
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_assert
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsicmp
calloc
exit
free
fwrite
getenv
iswspace
malloc
memcmp
memcpy
memmove
memset
realloc
strchr
strcmp
strcspn
strlen
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcstoul
user32
AdjustWindowRect
AppendMenuW
BeginPaint
ChangeDisplaySettingsExW
ClientToScreen
ClipCursor
CopyIcon
CreateDesktopW
CreateIcon
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawCaptionTempW
DrawFrameControl
DrawIconEx
DrawTextW
EndPaint
EnumDisplayDevicesW
EnumDisplaySettingsExW
ExitWindowsEx
GetAncestor
GetClientRect
GetDC
GetDesktopWindow
GetForegroundWindow
GetMenuInfo
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindow
GetWindowLongPtrW
GetWindowLongW
GetWindowRect
GetWindowThreadProcessId
InsertMenuItemW
IntersectRect
InvalidateRect
IsIconic
IsWindowEnabled
IsWindowVisible
KillTimer
LoadCursorA
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
MsgWaitForMultipleObjects
PaintDesktop
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
SendMessageW
SendNotifyMessageW
SetCursor
SetForegroundWindow
SetMenuInfo
SetMenuItemInfoW
SetParent
SetShellWindow
SetThreadDesktop
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SubtractRect
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
UnregisterClassW
UpdateLayeredWindow
UpdateWindow
win32u
NtUserMessageCall
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ