Static task
static1
Behavioral task
behavioral1
Sample
5ec10e56d0161e6be7c859a9561f6921436f0d2a30b1a4882a416212aa89810a.exe
Resource
win7-20230712-en
General
-
Target
5ec10e56d0161e6be7c859a9561f6921436f0d2a30b1a4882a416212aa89810a
-
Size
3.3MB
-
MD5
a16c6243078558658fa414d8769d45c1
-
SHA1
9064d602ff71857c28e429ada861a40144138586
-
SHA256
5ec10e56d0161e6be7c859a9561f6921436f0d2a30b1a4882a416212aa89810a
-
SHA512
2eb438eeb86f6732bcc351ff430ae0c6f382e8cb92f3d5dc606c41dc757b10333aa8684ef0a1953f1b808f19465af4f1cf5e2f60e8768b11e97bc5be9c78d109
-
SSDEEP
49152:1Qyjx4sfkSeiLoC2fSBiZZ0o54XK2D5PGUzV+OOb/Tz2VtPyMR6SBbBFp/jnO95N:1QyVcSebfSBIZl54VGY4b34wMR6YbBF0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ec10e56d0161e6be7c859a9561f6921436f0d2a30b1a4882a416212aa89810a
Files
-
5ec10e56d0161e6be7c859a9561f6921436f0d2a30b1a4882a416212aa89810a.exe windows x86
07a83aa872b7b35a22390fd19831eaae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VerSetConditionMask
CloseHandle
GetLastError
SetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
GetCurrentProcess
GetCurrentThread
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetProcAddress
LoadLibraryW
LocalFree
VerifyVersionInfoW
GetDateFormatW
GetTimeFormatW
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetFileAttributesW
OpenProcess
IsWow64Process
FreeLibrary
GetModuleFileNameW
LoadLibraryA
GetPrivateProfileIntW
GetPrivateProfileStringW
GetComputerNameW
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
RemoveDirectoryW
Sleep
GetModuleHandleW
MoveFileExW
GlobalFree
CreateFileW
WriteFile
WaitNamedPipeW
GetOverlappedResult
CancelIo
WaitForSingleObject
GetTempPathW
GetCurrentProcessId
GetExitCodeProcess
ProcessIdToSessionId
GetVersionExW
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetLocalTime
ReadFile
SetFilePointer
SetEvent
ResetEvent
CreateEventW
CreateThread
GetExitCodeThread
ResumeThread
GetTickCount
MoveFileW
WritePrivateProfileStringW
GetFileSize
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
SetFileAttributesW
GetPrivateProfileSectionW
QueryPerformanceCounter
LoadLibraryExW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetFileAttributesExW
OutputDebugStringW
ReleaseMutex
CreateMutexW
GetCurrentThreadId
lstrlenA
GetFileInformationByHandle
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
lstrlenW
GetUserDefaultUILanguage
EnterCriticalSection
LeaveCriticalSection
GetCompressedFileSizeW
WaitForMultipleObjects
GetModuleHandleExW
CreateFileA
CreatePipe
DeviceIoControl
CreateProcessA
GetStartupInfoA
GetSystemTime
FormatMessageW
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
RtlUnwind
VirtualAlloc
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitThread
FreeLibraryAndExitThread
GetStdHandle
ExitProcess
IsValidLocale
EnumSystemLocalesW
GetFileType
GetConsoleMode
ReadConsoleW
GetTimeZoneInformation
GetFileSizeEx
SetFilePointerEx
SetConsoleCtrlHandler
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
FlushFileBuffers
GetConsoleCP
SetEndOfFile
WriteConsoleW
InitializeCriticalSection
SleepEx
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
PeekNamedPipe
VerifyVersionInfoA
SetConsoleMode
ReadConsoleA
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
GetDriveTypeW
GetFullPathNameW
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 674KB - Virtual size: 674KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 27KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 254KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 155KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE