Static task
static1
Behavioral task
behavioral1
Sample
ec4eb4f1f018d18e8e143e35fd930793ce43ba7f7336ac3dd529b715cd881854.exe
Resource
win7-20240729-en
General
-
Target
ec4eb4f1f018d18e8e143e35fd930793ce43ba7f7336ac3dd529b715cd881854.exe
-
Size
510KB
-
MD5
f786dd4800f09abe67a76b18fe7a482d
-
SHA1
a8afd8254553f6394f79ffe28280143e7cfa19e3
-
SHA256
ec4eb4f1f018d18e8e143e35fd930793ce43ba7f7336ac3dd529b715cd881854
-
SHA512
353609aef28d65f34a2c06eb9c72122123084c0fc9b8bed2708f8c4202ade1c7c355b27ac22b35f20ae496f46d242dd0ab17ebe4b35a9b4d8c70dcb703044253
-
SSDEEP
12288:deO4ivVb83+hs/c8NViqI4+EiZVeRrs7ngjK8JxddvxDcMGk4J2M0Tf:L4Wdhs/tmV4+EjXKsgMGk4J/0Tf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec4eb4f1f018d18e8e143e35fd930793ce43ba7f7336ac3dd529b715cd881854.exe
Files
-
ec4eb4f1f018d18e8e143e35fd930793ce43ba7f7336ac3dd529b715cd881854.exe.exe windows:4 windows x86 arch:x86
5d728a83a37c173ec3fea6d6eb5d32fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
EqualSid
GetSecurityInfo
GetTokenInformation
GetUserNameA
OpenProcessToken
OpenThreadToken
kernel32
CloseHandle
CreateConsoleScreenBuffer
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateRemoteThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
FindClose
FindFirstFileA
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
FlushFileBuffers
GenerateConsoleCtrlEvent
GetACP
GetCPInfo
GetCompressedFileSizeA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExA
GetDiskFreeSpaceExW
GetDriveTypeA
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesExA
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetNumberOfConsoleInputEvents
GetProcAddress
GetProcessId
GetProcessTimes
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GetVolumeInformationA
GetVolumeInformationW
GlobalMemoryStatus
InitializeCriticalSection
IsDBCSLeadByteEx
IsValidCodePage
IsWow64Process
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFree
MapViewOfFile
MoveFileExA
MultiByteToWideChar
OpenProcess
PeekConsoleInputA
PeekNamedPipe
Process32First
Process32Next
QueryPerformanceCounter
ReadConsoleInputW
ReadDirectoryChangesW
ReadProcessMemory
ResetEvent
SetConsoleActiveScreenBuffer
SetConsoleCP
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleOutputCP
SetConsoleScreenBufferSize
SetConsoleTextAttribute
SetConsoleTitleA
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
SleepEx
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
msvcrt
___mb_cur_max_func
__getmainargs
__initenv
__lconv_init
__p___argv
__p__acmdln
__p__fmode
__set_app_type
__setusermatherr
_access
_amsg_exit
_cexit
_environ
_errno
_exit
_fdopen
_findclose
_fstati64
_fullpath
_get_osfhandle
_getch
_initterm
_iob
_isatty
_lseeki64
_onexit
_open_osfhandle
_pipe
_setjmp3
_setmode
_spawnve
_stricmp
_strnicmp
_telli64
_tzset
_vsnprintf
abort
atof
atoi
bsearch
calloc
clearerr
clock
exit
fclose
feof
ferror
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
fread
free
freopen
fseek
fwrite
getc
getchar
getenv
isalnum
isalpha
iscntrl
isgraph
islower
isprint
ispunct
isspace
isupper
isxdigit
localeconv
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
mktime
localtime
gmtime
ctime
putc
putchar
qsort
raise
rand
realloc
rename
setbuf
setlocale
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtok
strtol
strtoul
tolower
toupper
ungetc
vfprintf
time
wcslen
wcsncmp
wcstombs
_findnext
_findfirst
longjmp
_timezone
_write
_wcsnicmp
_unlink
_umask
_tzset
_strdup
_rmdir
_read
_putenv
_open
_mktemp
_mkdir
_getpid
_getcwd
_getche
_fileno
_fdopen
_dup2
_dup
_creat
_close
_chmod
_chdir
_stricmp
psapi
EnumProcessModules
GetModuleFileNameExA
GetProcessImageFileNameA
shell32
ShellExecuteExA
user32
CharToOemA
DispatchMessageA
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
userenv
GetUserProfileDirectoryA
ws2_32
WSACleanup
WSAEnumNetworkEvents
WSAEventSelect
WSAGetLastError
WSASetLastError
WSASocketA
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
freeaddrinfo
getaddrinfo
gethostbyaddr
gethostname
getnameinfo
getpeername
getservbyname
htonl
htons
inet_addr
inet_ntoa
listen
ntohl
ntohs
recv
select
setsockopt
shutdown
Sections
.text Size: 414KB - Virtual size: 413KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
��Y|�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE