Static task
static1
Behavioral task
behavioral1
Sample
e6e4f65abe93fe7da5b738c415debaef48b4749f040531a143b4468cc8356024.exe
Resource
win7-20240903-en
General
-
Target
e6e4f65abe93fe7da5b738c415debaef48b4749f040531a143b4468cc8356024
-
Size
360KB
-
MD5
5b757d8551dfe902130029e98239145a
-
SHA1
f6331b821491ce9867a07ca44f45ddef67f5af27
-
SHA256
e6e4f65abe93fe7da5b738c415debaef48b4749f040531a143b4468cc8356024
-
SHA512
a3996ff5b2a6104d44452456be6f4806cd1c1150eabaf244258efe57c3c4dd67b17b66861a010a92e7113bfac70ca51e888021450e8f16494dd207ffc8f94722
-
SSDEEP
6144:T9RXjdVdeqPUa51VU5qiHorWQABLsd4s:T9RTj0qPUa5bQorWQABLbs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e6e4f65abe93fe7da5b738c415debaef48b4749f040531a143b4468cc8356024
Files
-
e6e4f65abe93fe7da5b738c415debaef48b4749f040531a143b4468cc8356024.exe windows:4 windows x86 arch:x86
c9f7e018b269f1b5fe81cf757d6f8e93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
LoadLibraryA
GetProcAddress
WriteFile
GlobalReAlloc
GlobalSize
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalAlloc
VirtualAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleExA
GetModuleHandleA
GetStartupInfoA
user32
GetMenu
GetDlgItem
CharLowerA
DestroyWindow
ShowWindow
WinHelpA
DefFrameProcA
EnableMenuItem
GetParent
DefMDIChildProcA
EndDialog
CharUpperA
ReleaseDC
GetDC
SendMessageA
InvalidateRect
PostQuitMessage
SendDlgItemMessageA
wsprintfA
SetWindowPos
GetClientRect
SetScrollRange
SetScrollPos
LoadStringA
EndPaint
BeginPaint
DispatchMessageA
TranslateMessage
GetMessageA
CreateDialogParamA
UpdateWindow
CreateWindowExA
RegisterClassA
LoadCursorA
DialogBoxParamA
LoadIconA
gdi32
CreatePalette
DeleteObject
SelectObject
RealizePalette
SelectPalette
SaveDC
SetWindowOrgEx
RestoreDC
LineTo
MoveToEx
DPtoLP
Rectangle
SetROP2
SetViewportExtEx
SetWindowExtEx
SetMapMode
CreatePen
GetStockObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBitmap
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
_ftol
strncpy
strncmp
calloc
memset
strcpy
strlen
strcmp
memcpy
malloc
__set_app_type
_controlfp
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ