Static task
static1
Behavioral task
behavioral1
Sample
c5bd991e9549607787012bd686c1ee4bc17489f369d3cb154c58de03cfa59ae7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c5bd991e9549607787012bd686c1ee4bc17489f369d3cb154c58de03cfa59ae7.exe
Resource
win10v2004-20230220-en
General
-
Target
c5bd991e9549607787012bd686c1ee4bc17489f369d3cb154c58de03cfa59ae7
-
Size
1.2MB
-
MD5
845f7a6128d9d597d25440708f02f4e1
-
SHA1
0d8703b2bdb8dcd4d7de17957994a3a2538084ce
-
SHA256
c5bd991e9549607787012bd686c1ee4bc17489f369d3cb154c58de03cfa59ae7
-
SHA512
1040f61c284ae4fcb8e4b5ff4b4deb92ae1f6d3e07080d20882eabcb6196c7c150fd289d8bbefbaf30339d3afb8ef247752f9da33ed6204a7d550b93b41ef057
-
SSDEEP
24576:Nh+XzktZuYr8XMG972fc5wClGaT/SdSNx0rrF2KDvD1Nw7HDiHp1D:CtZZFuaT/SIdKDrXw7DiHp1D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5bd991e9549607787012bd686c1ee4bc17489f369d3cb154c58de03cfa59ae7
Files
-
c5bd991e9549607787012bd686c1ee4bc17489f369d3cb154c58de03cfa59ae7.exe windows x86
4227dcfda2ec0f070ae6116f97c51a46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
kernel32
HeapAlloc
GetProcAddress
LocalFree
GetProcessHeap
GetModuleHandleW
FreeLibrary
GetUserDefaultLangID
QueryDosDeviceW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
DeviceIoControl
LocalAlloc
GetSystemDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetThreadExecutionState
GetProcessTimes
GetDriveTypeW
OpenThread
TerminateThread
OutputDebugStringW
LoadLibraryW
MoveFileExW
FindClose
SystemTimeToTzSpecificLocalTime
GetPrivateProfileStringW
FindFirstFileW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
lstrcmpiW
lstrcatW
WriteConsoleW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetLastError
GetCurrentProcess
HeapFree
GetCurrentProcessId
GetLocalTime
GetCurrentThreadId
CreateFileW
SetFilePointer
GetModuleFileNameW
WriteFile
CloseHandle
OpenProcess
WaitForSingleObject
GetTickCount
WaitForMultipleObjects
HeapSize
DecodePointer
Sleep
CreateProcessW
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
OpenEventW
CreateEventW
SetEvent
ResetEvent
GetComputerNameExW
GlobalAlloc
GlobalFree
CreateMutexW
ReleaseMutex
OpenMutexW
SearchPathW
ExpandEnvironmentStringsW
SwitchToThread
GetExitCodeProcess
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
WideCharToMultiByte
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetACP
MultiByteToWideChar
GetVolumeInformationW
GetDiskFreeSpaceW
ResumeThread
GetFileAttributesW
LoadLibraryA
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
SetFileTime
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
LoadLibraryExW
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
InterlockedExchangeAdd
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
FormatMessageW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetFileType
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
GetStringTypeW
HeapReAlloc
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
GetParent
GetWindowThreadProcessId
GetWindow
FindWindowExW
IsWindowVisible
OpenDesktopW
WindowFromPoint
CloseDesktop
ExitWindowsEx
FindWindowW
GetClassNameW
SwitchDesktop
GetDesktopWindow
GetSystemMetrics
advapi32
SystemFunction036
ReportEventW
RegisterEventSourceW
DeregisterEventSource
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
EqualSid
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
GetTokenInformation
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
shell32
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerListen
NdrServerCall2
NdrAsyncServerCall
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
imagehlp
ImageRemoveCertificate
ImageEnumerateCertificates
Sections
.text Size: 885KB - Virtual size: 885KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ