Static task
static1
Behavioral task
behavioral1
Sample
ee0a8975ce97cb4e237571b3bde6deb777b1995766c46f89e722e2ee44392537N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee0a8975ce97cb4e237571b3bde6deb777b1995766c46f89e722e2ee44392537N.exe
Resource
win10v2004-20241007-en
General
-
Target
ee0a8975ce97cb4e237571b3bde6deb777b1995766c46f89e722e2ee44392537N
-
Size
247KB
-
MD5
fa16a1112580ef5e90e09191b5b7c7b0
-
SHA1
b89e96ca675fd9046657523e8ed63e2559ae35f2
-
SHA256
ee0a8975ce97cb4e237571b3bde6deb777b1995766c46f89e722e2ee44392537
-
SHA512
25ec5abdbcc7de061dc3b4c50d5285f0a75f52395f70c52e58397e0f4ed8952cbab22de04287ea2ea987d5fd5a610e453475ad05ea0f2240ad97aebc3aa5f422
-
SSDEEP
3072:3uaLCc5NJCyZawVL1NbZyEC5ZXVYz3M5coy4ixZ2Hzaej:+aLCEjFZawVL1xuFYc5coIi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee0a8975ce97cb4e237571b3bde6deb777b1995766c46f89e722e2ee44392537N
Files
-
ee0a8975ce97cb4e237571b3bde6deb777b1995766c46f89e722e2ee44392537N.exe windows:5 windows x86 arch:x86
6b144b2a8aa52bb5ca8f14bcad3eb455
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
FillConsoleOutputCharacterA
GetNumaNodeProcessorMask
GetConsoleAliasExesLengthA
OpenJobObjectA
QueryDosDeviceA
GetComputerNameW
GetNumaAvailableMemoryNode
SleepEx
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetPriorityClass
GetEnvironmentStrings
FatalAppExitW
SetSystemTimeAdjustment
WriteConsoleOutputA
GetFileAttributesA
HeapCreate
SetConsoleMode
GetModuleFileNameW
GetBinaryTypeW
SetConsoleTitleA
GetShortPathNameA
GetStdHandle
GetLastError
GetCommandLineW
SearchPathA
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
MoveFileA
SetCommMask
FindAtomA
FoldStringA
WaitForMultipleObjects
CreatePipe
GetDefaultCommConfigA
GetModuleHandleA
FreeEnvironmentStringsW
BuildCommDCBA
PurgeComm
WaitForDebugEvent
GlobalReAlloc
CopyFileExA
GetVolumeInformationW
CreateFileA
GetProcAddress
DebugActiveProcess
HeapFree
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
ReadFile
GetLocaleInfoA
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
GetUserObjectInformationW
SetFocus
advapi32
ObjectPrivilegeAuditAlarmA
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 996KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ