Static task
static1
Behavioral task
behavioral1
Sample
efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af.exe
Resource
win10v2004-20241007-en
General
-
Target
efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af
-
Size
212KB
-
MD5
351dfc379b03ed7ae674585207ea03b3
-
SHA1
e61db16ac456791a3780255cd02532fff808f97f
-
SHA256
efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af
-
SHA512
ed773bf3b011a740cc7601de995c951e1874070149785aa377520d1cafe0f4c68d4fd666083a39edb100a252eea85183818cd434848b93b8500256b697f797fc
-
SSDEEP
3072:lGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:lG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af
Files
-
efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af.exe windows:4 windows x86 arch:x86
728b5168c443fc8cea3c0c483ddbb8ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
GetProcAddress
GetCurrentThread
WaitForMultipleObjects
GlobalAlloc
OpenMutexA
InitializeCriticalSection
AddAtomA
CompareStringA
CopyFileA
IsValidLocale
lstrcpynA
OpenEventW
GetModuleHandleA
GetStartupInfoA
GetSystemDefaultLCID
GetACP
GetCalendarInfoW
OpenWaitableTimerA
Sleep
GetSystemDefaultLangID
CreateSemaphoreW
ExpandEnvironmentStringsW
lstrlenA
GetDateFormatA
CreateMailslotW
SystemTimeToFileTime
BeginUpdateResourceA
GetExpandedNameW
SearchPathA
DosDateTimeToFileTime
GetWindowsDirectoryW
GetEnvironmentStringsW
GetStringTypeA
QueryPerformanceCounter
user32
GetDlgItemTextW
DialogBoxParamA
LoadMenuIndirectW
GetCapture
GetClassInfoW
IsIconic
LoadBitmapA
GetDC
PeekMessageW
GetMenuState
SetWindowTextW
GetWindowRect
UpdateWindow
GetForegroundWindow
DialogBoxIndirectParamA
ShowWindow
EnumClipboardFormats
AdjustWindowRect
SetCursorPos
ReleaseDC
InsertMenuA
CreateWindowExA
ActivateKeyboardLayout
LoadIconW
DrawTextA
DialogBoxIndirectParamW
gdi32
FillPath
UnrealizeObject
SetDIBits
CreateScalableFontResourceW
GetTextFaceA
CreateFontW
SelectClipRgn
AnimatePalette
advapi32
RegOpenKeyExA
RegOpenKeyW
RegDeleteKeyA
RegOpenKeyW
shlwapi
SHRegGetBoolUSValueW
PathIsUNCServerShareA
PathRemoveExtensionA
PathGetDriveNumberW
IntlStrEqWorkerA
PathMakePrettyA
StrCmpNIW
UrlCombineW
comctl32
DrawStatusText
CreateMappedBitmap
ImageList_Write
inetcomm
MimeOleGenerateCID
MimeOleSetBodyPropW
EssKeyExchPreferenceDecodeEx
CreateSMTPTransport
MimeOleSMimeCapInit
MimeOleSMimeCapGetHashAlg
MimeEditIsSafeToRun
MimeOleParseMhtmlUrl
EssSecurityLabelEncodeEx
MimeOleGetRelatedSection
MimeOleGetFileInfoW
EssReceiptRequestEncodeEx
MimeOleCreateSecurity
MimeOleFileTimeToInetDate
MimeOleSMimeCapGetEncAlg
MimeOleGetInternat
MimeOleSMimeCapAddCert
EssSignCertificateDecodeEx
oledlg
OleUIObjectPropertiesW
OleUIConvertW
OleUIPasteSpecialW
OleUIConvertA
OleUIPromptUserA
OleUIAddVerbMenuW
OleUIEditLinksA
OleUIPasteSpecialA
Sections
.qYS Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.jvNc Size: 2KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bCq Size: 3KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gMFODl Size: 3KB - Virtual size: 329KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 109KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ifpDc Size: 3KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Ox Size: 2KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ