Static task
static1
Behavioral task
behavioral1
Sample
5eb27c592848727f371150a3d1a59b3a911e46aa5bf6718bcac8521b67dbe6e3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5eb27c592848727f371150a3d1a59b3a911e46aa5bf6718bcac8521b67dbe6e3.exe
Resource
win10v2004-20230703-en
General
-
Target
5eb27c592848727f371150a3d1a59b3a911e46aa5bf6718bcac8521b67dbe6e3
-
Size
3.8MB
-
MD5
87bf24b78f4f346f589613c3ca5f5d42
-
SHA1
9652665df3ac46239ade6f456682c2b53ef203a0
-
SHA256
5eb27c592848727f371150a3d1a59b3a911e46aa5bf6718bcac8521b67dbe6e3
-
SHA512
905f3238d570ba79c0fd8e9b2ec8b5c727e4f17de8b98230d0fa00427b78f73e38856787270c22f523dca15b59e9425c5a8b7d2415b6178dd1cff1d53c490dbb
-
SSDEEP
49152:HFnURrOSgPREAdSjAbDiY1pIk4AV1hc6rssgcFbxau2oR9sXafgkDFMVR9C1UhPb:HFnwaSg3dS81p/4yc6fbahzBiCV2C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5eb27c592848727f371150a3d1a59b3a911e46aa5bf6718bcac8521b67dbe6e3
Files
-
5eb27c592848727f371150a3d1a59b3a911e46aa5bf6718bcac8521b67dbe6e3.exe windows x86
2bb1d907fe543d027ab611cb4cb31fb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetFileAttributesExW
FindFirstFileExW
DecodePointer
FindResourceExW
InitializeCriticalSectionAndSpinCount
RaiseException
WritePrivateProfileStringA
WritePrivateProfileStringW
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceW
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetVolumeInformationW
GetDiskFreeSpaceExW
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalAlloc
GlobalUnlock
GlobalLock
SetEndOfFile
WriteConsoleW
SetStdHandle
LCMapStringW
GetLocalTime
CreateMutexW
GetVersionExW
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetStartupInfoW
Sleep
GetModuleHandleW
TerminateProcess
OpenProcess
CreateProcessW
GetStdHandle
GetExitCodeProcess
SetFilePointer
WriteFile
DuplicateHandle
GetDriveTypeW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
FindClose
DeleteFileW
FindNextFileW
FindFirstFileW
MoveFileExW
GetFileSize
GetFileSizeEx
CreateFileW
SetEvent
CloseHandle
TerminateThread
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
GetCPInfo
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetThreadPriority
ReadFile
DeviceIoControl
WaitForSingleObject
GetLastError
CreateEventW
GetLogicalDriveStringsW
SetLastError
HeapSize
HeapReAlloc
FreeLibrary
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentThread
GetACP
ExitProcess
MulDiv
GetCurrentProcessId
EncodePointer
CreateThread
ExitThread
LoadLibraryExW
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
CreateTimerQueue
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
user32
SetWindowPos
BringWindowToTop
SetForegroundWindow
GetDC
ReleaseDC
ShowWindow
GetWindowLongW
SendMessageW
IsIconic
GetSystemMetrics
KillTimer
SetTimer
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
EnableWindow
ClientToScreen
GetPropW
SetPropW
wvsprintfW
SetCursor
UnionRect
OffsetRect
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
IsWindow
SetFocus
GetClientRect
GetParent
GetWindow
LoadImageW
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
IsZoomed
SetWindowRgn
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
HideCaret
ShowCaret
SetCaretPos
CreateCaret
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
GetGUIThreadInfo
FindWindowExW
RegisterClassW
wsprintfW
SetWindowTextW
PostQuitMessage
CloseWindow
MessageBoxW
DestroyWindow
SetWindowLongW
CreateWindowExW
PostMessageW
DefWindowProcW
PtInRect
GetCursorPos
gdi32
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectW
DeleteDC
GetDeviceCaps
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CreateSolidBrush
SetBkMode
SetTextColor
CombineRgn
CreatePenIndirect
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
CreateDIBSection
MoveToEx
TextOutW
ExtTextOutW
GdiFlush
advapi32
RegCloseKey
RegDeleteValueW
RegOpenKeyW
RegCreateKeyW
RegQueryValueExW
DuplicateTokenEx
OpenProcessToken
shell32
ord165
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
shlwapi
PathFileExistsW
StrStrIA
PathIsRootW
ws2_32
gethostbyname
socket
setsockopt
closesocket
inet_addr
ntohs
WSAStartup
shutdown
recv
send
connect
wininet
HttpSendRequestExW
InternetConnectW
InternetOpenW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
comctl32
ord17
_TrackMouseEvent
imm32
ImmSetCompositionFontW
ImmReleaseContext
ImmGetContext
ImmGetVirtualKey
ImmSetCompositionWindow
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipAlloc
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipFree
GdipSetSmoothingMode
Sections
.text Size: 832KB - Virtual size: 831KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ