Static task
static1
Behavioral task
behavioral1
Sample
ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366.exe
Resource
win10v2004-20241007-en
General
-
Target
ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366
-
Size
32KB
-
MD5
bead953595a4a3c373144063dfa8f885
-
SHA1
d1caecaacfc8b0cbf65fb50155c32fa2d141eee7
-
SHA256
ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366
-
SHA512
a1b40ac1872ca15b0001cc9e2f35e2d16728e617719fd90ab08648b8a30acd35cb045d5c16fd3bb8b7d720695ae5189c5a20f952891c73e16888b5e9f35797af
-
SSDEEP
192:p/Qn5smrSUcVRwLgyAOSfUML5dyfeqR6J+idTcXNwfKYfwDLXkk65oa2hTbP4oyP:ynaUczqSMxRhIT7EHXfSoa2d43eZZIl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366
Files
-
ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366.exe windows:4 windows x86 arch:x86
a0b04fa39ab41c1a5dbae22d0771c005
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetModuleHandleA
GetVersionExA
GetWindowsDirectoryA
GetFileAttributesA
SetFileAttributesA
MultiByteToWideChar
GetSystemDirectoryA
GetTempPathA
GetModuleFileNameA
GetShortPathNameA
CopyFileA
lstrlenA
WinExec
advapi32
AddAccessAllowedAce
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
InitializeAcl
SetNamedSecurityInfoA
AllocateAndInitializeSid
ole32
CoCreateInstance
CoInitialize
CoUninitialize
mfc42
ord1575
ord5710
ord2781
ord561
ord815
ord540
ord800
ord941
ord535
ord5572
ord2818
ord860
ord858
ord2764
ord2915
ord926
ord939
ord537
ord798
ord6392
ord5778
ord1997
ord6407
ord5194
ord533
ord922
ord924
ord4277
ord4129
ord5683
ord668
ord2770
ord356
ord4204
ord1980
ord3181
ord4058
msvcrt
_mbscmp
__dllonexit
_onexit
_exit
_XcptFilter
exit
rand
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
time
srand
__CxxFrameHandler
__p___initenv
msvcp60
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ