Static task
static1
Behavioral task
behavioral1
Sample
a5930859fdf4846cc74e01042067aaaeda3eae5320847bd489ab6d4825cc230a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a5930859fdf4846cc74e01042067aaaeda3eae5320847bd489ab6d4825cc230a.exe
Resource
win10v2004-20230220-en
General
-
Target
a5930859fdf4846cc74e01042067aaaeda3eae5320847bd489ab6d4825cc230a
-
Size
829KB
-
MD5
97c8725954c5a4c03773aa63ed150128
-
SHA1
d670d1b9afe2f31e64bbe1fee97618f29676b979
-
SHA256
a5930859fdf4846cc74e01042067aaaeda3eae5320847bd489ab6d4825cc230a
-
SHA512
a11fab61759d8b68ab83a1654593575c7804c78c41189a6e2261afb38cfb1301c0c35956911746009c15f28a704dc73bb9111d21795cb841dd54a1a161e070a4
-
SSDEEP
24576:9Qd7siVZ8DbQC8WDC9pf03mn+nb+HwINVSDd6hVvjDmo:9i/C8kC9p2my+pLShwVuo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5930859fdf4846cc74e01042067aaaeda3eae5320847bd489ab6d4825cc230a
Files
-
a5930859fdf4846cc74e01042067aaaeda3eae5320847bd489ab6d4825cc230a.exe windows x86
1393d4319b48b07367ea7efec0646a8f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
kernel32
CreateFileA
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
FreeLibrary
GetProcessHeap
HeapAlloc
GetModuleFileNameW
LocalFree
CreateProcessW
WaitForSingleObject
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetEnvironmentVariableW
SetThreadPriority
GetCurrentProcess
SetPriorityClass
GetCurrentThread
GetModuleHandleW
GetVersionExW
ExpandEnvironmentStringsW
CreateFileW
GetCommandLineW
GetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
FindNextFileW
FindFirstFileW
FindClose
FormatMessageW
InterlockedExchangeAdd
SetFileTime
WriteFile
SetEndOfFile
GetFileSize
ReadFile
SetFilePointer
ResumeThread
WideCharToMultiByte
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
lstrlenW
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
DeleteFileW
GetTempFileNameW
SetFileAttributesW
GetLongPathNameW
MoveFileW
CreateEventW
SetEvent
ResetEvent
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
MultiByteToWideChar
WaitForMultipleObjects
GetACP
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
user32
EnableWindow
PostQuitMessage
DispatchMessageW
IsDialogMessageW
SetTimer
CreateDialogParamW
LoadIconW
TranslateMessage
IsWindowVisible
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
SetFocus
GetWindowTextW
SetWindowTextW
GetDlgItem
SendMessageW
EndDialog
KillTimer
GetDesktopWindow
LoadStringW
GetMessageW
ScreenToClient
gdi32
DeleteObject
CreateSolidBrush
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoInitialize
CoCreateInstance
Sections
.text Size: 257KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ