Static task
static1
Behavioral task
behavioral1
Sample
5b0caabaca0b74exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
5b0caabaca0b74exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5b0caabaca0b74exeexeexeex.exe
-
Size
1.9MB
-
MD5
5b0caabaca0b74c5d5b3006675d062c9
-
SHA1
348d53439f25d86c5267940e3bff1237c7f7848a
-
SHA256
db2857c9fbb6fe590a2873216f531137b883d7506ddbec927b039f0b945d9d2c
-
SHA512
48bc823e0c690903a3ea68351f5dc03b90e2d4b366a18a86c538b0e9909436a95c80e4b8e41315a997c0a972f845c1046bd26d974a5b2d6c5c8d889318e2905a
-
SSDEEP
49152:rEmZVtiJ0iZt5YS+LECjeRQ8y/Q+AgiyeCP:rEAVtiJ0iZ7YSMECjB/Qz5u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b0caabaca0b74exeexeexeex.exe
Files
-
5b0caabaca0b74exeexeexeex.exe.exe windows x86
f1b1ed0f5d1a3d25222d49bee18d0d97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
sti
StiCreateInstanceW
apdadrv
?ADD4Termination@CApdadrv@@QAEKXZ
?ioctl@CApdadrv@@QAEPAXW4apdadrvIoctl_t@@PAX@Z
?ADGetDeviceID@CApdadrv@@QAEKPAEK@Z
?ADD4Negotiation@CApdadrv@@QAEKXZ
?ADD4ReceiveDataFromDataCh@CApdadrv@@QAEKPAEKAAK@Z
?ADD4SendAndReceiveCtrlCh@CApdadrv@@QAEKPAEK0KAAK@Z
?ADPortClose@CApdadrv@@QAEHXZ
?ADPortOpen@CApdadrv@@QAEKPBD@Z
??0CApdadrv@@QAE@XZ
?ADSetRWTimeOut@CApdadrv@@QAEXU_COMMTIMEOUTS@@@Z
?ADD4SendDataToDataCh@CApdadrv@@QAEKPAEKAAK@Z
??1CApdadrv@@QAE@XZ
strgene
?GetStrImage@@YAXPAEHPAY1BGI@DA@E@Z
kernel32
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FindResourceExA
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
RtlUnwind
GetSystemTimeAsFileTime
GetDriveTypeA
SetEndOfFile
GetFileInformationByHandle
PeekNamedPipe
GetFileType
ExitProcess
GetTimeFormatA
GetDateFormatA
VirtualAlloc
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
VirtualProtect
GetModuleFileNameW
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
MulDiv
GlobalUnlock
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomA
SuspendThread
SetEvent
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
GlobalLock
lstrcmpA
CompareStringA
CompareStringW
InterlockedExchange
GetVersion
CreateEventA
WaitForSingleObject
WritePrivateProfileStringA
lstrlenW
GetModuleHandleA
CopyFileA
GetProcAddress
FreeLibrary
LoadLibraryA
GlobalAlloc
GlobalFree
SetFileAttributesA
FindFirstFileA
MoveFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
GetSystemDefaultLangID
CreateMutexW
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
GetVersionExA
CreateFileA
DeviceIoControl
GetLastError
CloseHandle
MultiByteToWideChar
InterlockedDecrement
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
lstrlenA
ResumeThread
GetExitCodeThread
Sleep
GetWindowsDirectoryA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
RaiseException
user32
MapDialogRect
GetSysColorBrush
UnregisterClassA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
SetScrollInfo
SetWindowPlacement
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSysColor
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
GetTopWindow
DestroyMenu
SetSystemCursor
MessageBoxA
WinHelpA
SendMessageA
GetParent
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperA
KillTimer
SetTimer
wsprintfA
IsWindowVisible
UpdateWindow
LoadCursorA
CopyIcon
SetDlgItemTextA
GetSystemMetrics
GetWindowRect
RedrawWindow
EnableWindow
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetClientRect
LoadIconA
PostMessageA
DispatchMessageA
TranslateMessage
PeekMessageA
ReleaseDC
EndPaint
BeginPaint
GetDlgCtrlID
GetDC
InvalidateRect
PtInRect
gdi32
SetTextColor
DeleteDC
GetStockObject
GetDeviceCaps
EnumFontFamiliesExA
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CreateCompatibleDC
CreateDIBitmap
SelectObject
SetStretchBltMode
StretchBlt
DeleteObject
CreateFontA
CreateSolidBrush
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetClipBox
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
EnumPortsA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
ShellExecuteA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
ole32
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
SysAllocStringLen
SysStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantChangeType
VariantInit
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 16.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ