Static task
static1
Behavioral task
behavioral1
Sample
5e8ee6be4e86fc2d7a7cfe00d.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
5e8ee6be4e86fc2d7a7cfe00d.exe
Resource
win10v2004-20230703-en
General
-
Target
5e8ee6be4e86fc2d7a7cfe00d.exe
-
Size
706KB
-
MD5
43c5131b7ce82a1fd0fd9a8ab5fa94de
-
SHA1
aa6cebd2e6428b6154d6c8e5fcb62031e497727f
-
SHA256
5e8ee6be4e86fc2d7a7cfe00d5afcf611c75f5f3b50e0ff4b82f04a2173a13ed
-
SHA512
cbc0b98b22c7e7bf39754a4ba6e552a908c47cf031164822be8cfed7eaa7f4d8425c6d294fb57b978889b9cae072059b53fe576d1358f73a36a7e5f571642234
-
SSDEEP
12288:bcgYJlX9iKqVaFw6biJW/R7wrvNz26BlUbCgxs0xhh2g:Vk8VaFw6qCwzNzzl8tskhZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e8ee6be4e86fc2d7a7cfe00d.exe
Files
-
5e8ee6be4e86fc2d7a7cfe00d.exe.exe windows x86
60ab51adb6f29b066a84d30a383df1ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
SetLocaleInfoA
GetProfileIntW
DeleteVolumeMountPointA
EnumCalendarInfoW
GetLogicalDriveStringsW
UnlockFile
GetTickCount
GetConsoleAliasesA
GetCompressedFileSizeW
ClearCommBreak
GetDateFormatA
FindResourceExA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
GetStringTypeExW
FindNextVolumeW
MulDiv
ReplaceFileW
GetVolumePathNameA
GetDevicePowerState
FindFirstFileA
OpenMutexW
GetComputerNameA
lstrcmpiA
GetProcAddress
GetLongPathNameA
BeginUpdateResourceW
EnumDateFormatsExA
IsValidCodePage
EnumSystemCodePagesW
LoadLibraryA
CreateFileMappingA
LocalAlloc
CreateHardLinkW
GetNumberFormatW
SetCurrentDirectoryW
SetProcessWorkingSetSize
HeapWalk
GetModuleHandleA
ReadConsoleInputW
GetWindowsDirectoryW
CloseHandle
CreateFileA
FlushFileBuffers
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetCPInfo
GetACP
GetOEMCP
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
RaiseException
user32
CharUpperBuffW
GetMenuBarInfo
DdeQueryStringW
LoadMenuW
GetClipboardOwner
CharToOemBuffA
gdi32
GetCharABCWidthsI
Sections
.text Size: 631KB - Virtual size: 631KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ