Static task
static1
Behavioral task
behavioral1
Sample
e4d6c23cfa2d5df540429e5b9221d9581872db5f36fbe4f9a9abd364c9a7797b.exe
Resource
win7-20240903-en
General
-
Target
e4d6c23cfa2d5df540429e5b9221d9581872db5f36fbe4f9a9abd364c9a7797b.exe
-
Size
404KB
-
MD5
202b18f7450f1355aee485f9d78da995
-
SHA1
395cf8b975612282bb0ebde4d316e0ce717fcb1a
-
SHA256
e4d6c23cfa2d5df540429e5b9221d9581872db5f36fbe4f9a9abd364c9a7797b
-
SHA512
9ec6b433b43e105a8932c88a0d7f01dffa0a22276a2d49d5afa56e8b333aa43a379b80e73ec095f383a560000af31e1dab28a92ee10bff68dbaf061ed127c3fe
-
SSDEEP
6144:9HZ9m88WiOH0/enY6gVJvdg0t59tO3tGoibkrL/1NUEP/b1Ivs:95486OH0/eAVX1Q3EkrDnTbGvs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4d6c23cfa2d5df540429e5b9221d9581872db5f36fbe4f9a9abd364c9a7797b.exe
Files
-
e4d6c23cfa2d5df540429e5b9221d9581872db5f36fbe4f9a9abd364c9a7797b.exe.exe windows:5 windows x86 arch:x86
7137110313ae94daa2401b00bdc7c7a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetUnhandledExceptionFilter
EnumCalendarInfoW
GetConsoleAliasA
InterlockedDecrement
GetNamedPipeHandleStateA
GetEnvironmentStringsW
SetComputerNameW
GetComputerNameW
GetProcessPriorityBoost
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
GetDriveTypeA
GetVolumePathNameW
LoadLibraryW
SetConsoleCP
GetFileAttributesA
SetConsoleMode
GetFileAttributesW
GetModuleFileNameW
FindNextVolumeMountPointW
GetStringTypeExA
CreateMutexW
OpenMutexW
InterlockedFlushSList
GetProcAddress
GetComputerNameExW
RemoveDirectoryA
PrepareTape
LocalAlloc
SetCalendarInfoW
AddVectoredExceptionHandler
FindFirstVolumeMountPointW
BeginUpdateResourceA
PostQueuedCompletionStatus
EnumResourceTypesW
Process32NextW
FindNextFileA
FreeEnvironmentStringsW
WaitForDebugEvent
GetVersionExA
FindAtomW
DeleteFileW
GetFileInformationByHandle
GetConsoleProcessList
CreateFileW
CloseHandle
EnumSystemLocalesA
DebugActiveProcess
InterlockedIncrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapSize
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
WriteFile
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
FatalAppExitA
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeLibrary
WriteConsoleW
DeleteFileA
user32
GetMenu
advapi32
ReportEventW
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ