Static task
static1
Behavioral task
behavioral1
Sample
5f4de2701910791472fa25d6782de8cbe53e39e1cdfa3908413d01d82c2e62cb.exe
Resource
win10v2004-20230220-en
General
-
Target
5f4de2701910791472fa25d6782de8cbe53e39e1cdfa3908413d01d82c2e62cb
-
Size
401KB
-
MD5
dc3352babcf165a455d86f015a26b742
-
SHA1
1fc13a29c121ff53eb74cb3c202e148cb92d3dd2
-
SHA256
5f4de2701910791472fa25d6782de8cbe53e39e1cdfa3908413d01d82c2e62cb
-
SHA512
8493fa9fa48070352b22c57fd05aaad61aaaf431a99305c9950fe67d160dd2a86ba7f83cb54d92d69b9e2fd13f8b4c0c503924c1e1af85c5288a19e53c8ad844
-
SSDEEP
6144:YYeNUWL37Z8OECYnGl3f5CgJPmubuC1SdOR2T3rlBU+1:YYeNprKOEC0GfYgQ+MU8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f4de2701910791472fa25d6782de8cbe53e39e1cdfa3908413d01d82c2e62cb
Files
-
5f4de2701910791472fa25d6782de8cbe53e39e1cdfa3908413d01d82c2e62cb.exe windows x86
f719d133eb0a7f30a0b9bd8ad8b269ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleA
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
AddConsoleAliasW
GetComputerNameW
GetTickCount
GetConsoleAliasesA
GetConsoleTitleA
GetWindowsDirectoryA
CreateActCtxW
CreateDirectoryExW
SetProcessPriorityBoost
GetCalendarInfoA
FormatMessageW
WriteConsoleOutputA
FindNextVolumeW
ReadFile
GetModuleFileNameW
GetStringTypeExA
SetCurrentDirectoryA
GetLogicalDriveStringsA
GetLastError
SetLastError
FindResourceExW
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
IsValidCodePage
LoadLibraryA
WriteConsoleA
CreateEventW
GlobalHandle
WaitForMultipleObjects
GetOEMCP
QueryMemoryResourceNotification
VirtualProtect
GetCurrentDirectoryA
GetVersionExA
FindAtomW
FindFirstVolumeW
GetCurrentProcessId
OpenFileMappingA
CommConfigDialogW
CreateThread
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetConsoleAliasExesA
CreateTimerQueue
ReadConsoleOutputCharacterA
LocalUnlock
GetStringTypeW
GetStringTypeA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ExitProcess
GetACP
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
user32
CharUpperBuffA
GetWindowLongW
LoadMenuW
CharToOemBuffW
GetCaretPos
gdi32
GetTextExtentPointW
advapi32
ReportEventA
ReadEventLogW
ole32
CoGetPSClsid
winhttp
WinHttpOpen
WinHttpSetDefaultProxyConfiguration
WinHttpCheckPlatform
msimg32
TransparentBlt
Sections
.text Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ