Static task
static1
Behavioral task
behavioral1
Sample
e2b4ce0bfb9417799291f3b57dc05aeb12af892d3f10783f00230e09c170f39e.exe
Resource
win7-20241010-en
General
-
Target
e2b4ce0bfb9417799291f3b57dc05aeb12af892d3f10783f00230e09c170f39e
-
Size
2.4MB
-
MD5
ea94f8d4731c8c713968adb4029d241d
-
SHA1
bc526b448197052b6224cec2a467e7265cb164ef
-
SHA256
e2b4ce0bfb9417799291f3b57dc05aeb12af892d3f10783f00230e09c170f39e
-
SHA512
44e2259bc866d9cc81f5735ae705c0b4634d07bd09d21d50fd6a5fe88ad1ab8b3aa09fe5eb5bc603e3305cb732ea36e2146930f25b66ace4e87d007748e17a6f
-
SSDEEP
49152:wcxQUmHZuZ793bhF6hXZuTexDB6P7QvLmkZf6ddFp5FQYa4:wwQUmHZ6793CX4eXEQzmRH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2b4ce0bfb9417799291f3b57dc05aeb12af892d3f10783f00230e09c170f39e
Files
-
e2b4ce0bfb9417799291f3b57dc05aeb12af892d3f10783f00230e09c170f39e.exe windows:5 windows x86 arch:x86
d79615b36c5b364a659310cef995ed57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
SetEvent
CreateThread
DeleteCriticalSection
DecodePointer
HeapReAlloc
HeapSize
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
GetPrivateProfileIntW
GetCurrentProcessId
LoadLibraryW
ReleaseMutex
CreateMutexW
WriteFile
FindClose
FileTimeToSystemTime
lstrcpyW
GetTempPathW
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
FindFirstFileW
FindNextFileW
CopyFileW
MoveFileExW
GetLongPathNameW
GetEnvironmentVariableW
GetDriveTypeW
GetSystemDirectoryW
CreateEventW
WTSGetActiveConsoleSessionId
LocalFree
GetCurrentProcess
GetCurrentThreadId
GetSystemInfo
GetModuleHandleW
GetVolumeInformationW
GetVersionExW
GlobalAlloc
GlobalFree
LocalAlloc
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeviceIoControl
OutputDebugStringA
SetPriorityClass
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
CloseHandle
SetEndOfFile
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
lstrlenW
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
WritePrivateProfileStringW
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
CreateDirectoryW
GetTickCount
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
GetACP
SetConsoleCtrlHandler
ExitProcess
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
ExitThread
RtlUnwind
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SystemTimeToFileTime
GetSystemTime
ReadConsoleW
ReadConsoleA
SetConsoleMode
GetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
QueryPerformanceCounter
SwitchToThread
GetCurrentThread
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
FormatMessageA
SleepEx
WaitForMultipleObjects
GetFileType
GetStdHandle
PeekNamedPipe
ExpandEnvironmentStringsA
VerSetConditionMask
GetModuleHandleA
GetSystemDirectoryA
VerifyVersionInfoA
GetModuleHandleExW
user32
wsprintfW
GetLastInputInfo
LoadStringW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
ImpersonateLoggedOnUser
RegisterEventSourceW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegOpenKeyW
RegEnumKeyW
ReportEventW
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
DeregisterEventSource
shell32
SHGetSpecialFolderPathA
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
shlwapi
PathAddBackslashW
wldap32
ord60
ord211
ord22
ord41
ord143
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord50
ord46
ws2_32
htons
gethostname
ioctlsocket
WSAStartup
WSACleanup
recv
send
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
bind
closesocket
connect
getpeername
getsockname
getsockopt
listen
ntohs
setsockopt
socket
WSAIoctl
getaddrinfo
freeaddrinfo
recvfrom
sendto
accept
wtsapi32
WTSQueryUserToken
wininet
HttpQueryInfoW
InternetQueryOptionW
InternetReadFile
InternetOpenUrlW
InternetSetOptionW
InternetOpenW
InternetCloseHandle
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 529KB - Virtual size: 529KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 148KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE