Static task
static1
Behavioral task
behavioral1
Sample
51ff450f0ac5dca5795157daf811bc09c7ea870c7d292ef1a09bda7b7932d699.exe
Resource
win10-20230703-en
General
-
Target
51ff450f0ac5dca5795157daf811bc09c7ea870c7d292ef1a09bda7b7932d699
-
Size
308KB
-
MD5
681ab0131a64a5bfe530655458254f1f
-
SHA1
4e3dac7cb734ab768d0419dc5c8bbf579cab257e
-
SHA256
51ff450f0ac5dca5795157daf811bc09c7ea870c7d292ef1a09bda7b7932d699
-
SHA512
f87850d94d0d0b09f363f9405032670de96209f7a38ef8e1047dcfbb66d24448ae758fd93efdfc8f1aea7617af84546611ddcd180c5e98245ec2a2739a335bf3
-
SSDEEP
6144:sZzoI2527UVPLSkhXeZV/ZSmq+KgAC1ByZB5f7:seYUVjSWxgg20D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51ff450f0ac5dca5795157daf811bc09c7ea870c7d292ef1a09bda7b7932d699
Files
-
51ff450f0ac5dca5795157daf811bc09c7ea870c7d292ef1a09bda7b7932d699.exe windows x86
04e6f3b72e548c719c7cd8b3a1be4f09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetHandleInformation
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetTickCount
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
WaitNamedPipeW
EnumTimeFormatsA
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
GetExitCodeProcess
GetConsoleAliasW
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
GetStartupInfoW
CreateJobObjectA
EnumSystemLocalesA
GetConsoleAliasExesLengthA
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
SetLastError
GetProcAddress
MoveFileW
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
GetFileType
MoveFileA
GetNumberFormatW
GlobalGetAtomNameW
GetPrivateProfileSectionNamesA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
EnumDateFormatsW
PeekConsoleInputA
SetCalendarInfoA
OpenSemaphoreW
SetFileShortNameA
ReadConsoleInputW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DebugBreak
ResetWriteWatch
ReadConsoleOutputCharacterW
DeleteFileA
GetSystemDefaultLangID
MoveFileExA
GetConsoleAliasExesA
SetFilePointer
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
HeapReAlloc
GetConsoleCP
SetStdHandle
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
GetCharWidthW
GetTextFaceA
SelectPalette
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pibufu Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ