Static task
static1
Behavioral task
behavioral1
Sample
5de52198bbeca8e7f73a8d60050f11642fcde7ee46300ae2fcd91110e5ea64f9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5de52198bbeca8e7f73a8d60050f11642fcde7ee46300ae2fcd91110e5ea64f9.exe
Resource
win10v2004-20230703-en
General
-
Target
5de52198bbeca8e7f73a8d60050f11642fcde7ee46300ae2fcd91110e5ea64f9
-
Size
3.5MB
-
MD5
a4be9d50af53f3d1f4ed53c3daa81d65
-
SHA1
ee71552fb3050ea893dffe439f7e4097cf2a722c
-
SHA256
5de52198bbeca8e7f73a8d60050f11642fcde7ee46300ae2fcd91110e5ea64f9
-
SHA512
d2d3f55a14c8866308cc44f3fabb71cafb2310751284b4c64b06f7c020ddc32d14dca4c981a805f5ca1df3ba8907e1cf7b4c5e82666fac1047eb73e2e56004a9
-
SSDEEP
98304:rw0jVrdsAeTCh0ApgPJh7hGRJ+GlAzv/2fNt2M:rwyaAc4dpgRh7hGRZ+zLM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5de52198bbeca8e7f73a8d60050f11642fcde7ee46300ae2fcd91110e5ea64f9
Files
-
5de52198bbeca8e7f73a8d60050f11642fcde7ee46300ae2fcd91110e5ea64f9.exe windows x86
c7a59fd05f02f21ff21aee5552fd5dd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
user32
GetMenuItemCount
gdi32
SelectPalette
winmm
midiStreamRestart
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayGetUBound
comctl32
ord17
ws2_32
recvfrom
comdlg32
GetFileTitleA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.5MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 1000KB - Virtual size: 1000KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ