Static task
static1
Behavioral task
behavioral1
Sample
5ba56d06881f115d1d9b256f19812c44b1f5c3a9f052c557c7cb2755f7bc87f3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5ba56d06881f115d1d9b256f19812c44b1f5c3a9f052c557c7cb2755f7bc87f3.exe
Resource
win10v2004-20230703-en
General
-
Target
5ba56d06881f115d1d9b256f19812c44b1f5c3a9f052c557c7cb2755f7bc87f3
-
Size
6.4MB
-
MD5
7ad353c250c9cc12454e9e0abc5b6c79
-
SHA1
5fdad2962f86942500768e7e3506a35861e6a20d
-
SHA256
5ba56d06881f115d1d9b256f19812c44b1f5c3a9f052c557c7cb2755f7bc87f3
-
SHA512
f50b8468bfd1ba056d672302e14bf7afcbee7e39b96cfbc4387254243a46f7bab8f411b204b6e56cf6886772ce94cb1741ceffc7fd6508f4dd8c984b555247a8
-
SSDEEP
196608:3Jik/5V7PtODM0zVW8zNsNUa54kVy/u/jRQA3R9gdxQ34O2gD41Z7rVsRHN3dD1l:3JikxV7Pt50zVW8zNsNUa54kVy/u/jRF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ba56d06881f115d1d9b256f19812c44b1f5c3a9f052c557c7cb2755f7bc87f3
Files
-
5ba56d06881f115d1d9b256f19812c44b1f5c3a9f052c557c7cb2755f7bc87f3.exe windows x86
a6a5e03f1de0a6c654f4a831056a4765
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ioctlsocket
shutdown
htonl
gethostbyname
getservbyname
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
gethostname
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
wldap32
ord46
ord60
ord211
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord143
ord200
ord301
kernel32
TerminateProcess
GetTickCount
GetPrivateProfileIntW
WaitForSingleObject
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameW
GetTempPathW
CreateDirectoryW
FindFirstFileW
FindNextFileW
GetFileAttributesW
SetFileAttributesW
GetCurrentDirectoryW
WideCharToMultiByte
OpenFileMappingW
MapViewOfFile
GetLastError
CreateFileMappingW
UnmapViewOfFile
MulDiv
OutputDebugStringW
GetPrivateProfileStringW
MoveFileExW
OutputDebugStringA
GetCommandLineW
LoadLibraryW
VirtualAlloc
VirtualFree
GetModuleHandleA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
CreateEventA
CreateSemaphoreA
AreFileApisANSI
MultiByteToWideChar
LoadLibraryExW
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
SetFileTime
GetModuleHandleW
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
CreateDirectoryA
RemoveDirectoryA
RemoveDirectoryW
CreateFileW
SetFileAttributesA
DeleteFileA
MoveFileA
MoveFileW
FindClose
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetFileSize
WriteFile
ReadFile
DeviceIoControl
SetEndOfFile
SetFilePointer
CreateFileA
GetFileInformationByHandle
GetDriveTypeA
GetDriveTypeW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetVolumeInformationA
GetCurrentProcess
CloseHandle
FileTimeToSystemTime
GlobalMemoryStatus
GetSystemInfo
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
WaitForMultipleObjects
GetStdHandle
QueryPerformanceCounter
SetProcessAffinityMask
OpenEventA
OpenFileMappingA
GetProcessTimes
SetConsoleCtrlHandler
SetFileApisToOEM
GetConsoleScreenBufferInfo
GetConsoleMode
SetConsoleMode
OpenProcess
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LockResource
LoadResource
SizeofResource
FindResourceW
GetDiskFreeSpaceExA
GetVersionExW
GetLocaleInfoA
GetLocalTime
InitializeCriticalSectionEx
SleepEx
SystemTimeToFileTime
GetTickCount64
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
PeekNamedPipe
VerSetConditionMask
VerifyVersionInfoA
FlushConsoleInputBuffer
GetSystemTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
SetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleHandleExW
ExitProcess
ReadConsoleInputA
SetFilePointerEx
HeapReAlloc
RaiseException
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
ExitThread
CreateThread
GetStringTypeW
DecodePointer
EncodePointer
AllocConsole
SetConsoleTitleA
FreeConsole
lstrlenA
IsDBCSLeadByte
GlobalUnlock
GlobalLock
GetNativeSystemInfo
CreateProcessA
MoveFileExA
CopyFileA
QueryDosDeviceA
GetShortPathNameA
HeapFree
HeapAlloc
GetExitCodeProcess
Sleep
DeleteFileW
GetSystemDefaultLangID
InitializeSListHead
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameW
WaitForMultipleObjectsEx
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
GetCurrentThread
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
GetConsoleCP
GetEnvironmentStringsW
GetProcessHeap
GetOEMCP
FindFirstFileExW
CompareFileTime
GetACP
GetFileAttributesExW
VirtualQuery
GetThreadTimes
FlushFileBuffers
FreeEnvironmentStringsW
user32
GetProcessWindowStation
GetDesktopWindow
InvalidateRect
ClientToScreen
ReleaseCapture
SetCapture
CharLowerW
GetWindowThreadProcessId
PostMessageW
ExitWindowsEx
CharPrevExA
CharUpperW
CharUpperA
GetWindowRgn
DestroyWindow
SetWindowLongW
GetWindowLongW
GetUserObjectInformationW
LoadCursorW
DefWindowProcW
FindWindowW
GetWindowTextW
MessageBoxW
EndDialog
OffsetRect
MessageBoxA
SendMessageA
LoadIconW
SetWindowTextA
CreateWindowExW
MoveWindow
EnableWindow
wsprintfW
DrawTextA
ReleaseDC
DrawTextW
FillRect
GetClientRect
DialogBoxParamW
LoadStringW
SetWindowPos
GetSystemMetrics
GetWindowRect
ShowWindow
SetWindowTextW
SendMessageW
GetDlgItem
KillTimer
SetTimer
LoadBitmapW
OpenDesktopA
EnumDesktopWindows
CloseDesktop
PostMessageA
IsWindowVisible
OpenClipboard
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
GetForegroundWindow
SystemParametersInfoA
CharNextA
LoadStringA
RegisterClassExW
GetDC
gdi32
DeleteObject
GetTextExtentPointW
PtInRegion
CreateRectRgn
CreateDIBSection
CreateFontIndirectW
GetDeviceCaps
DeleteDC
BitBlt
SetTextColor
SetBkMode
CreateSolidBrush
SelectObject
CreateCompatibleDC
SetBitmapBits
CreateCompatibleBitmap
GetBitmapBits
GetObjectW
advapi32
AllocateAndInitializeSid
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegQueryInfoKeyA
RegOpenKeyA
RegEnumValueA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AdjustTokenPrivileges
GetFileSecurityW
LookupPrivilegeValueA
SetFileSecurityW
OpenProcessToken
shell32
SHGetPathFromIDListA
ShellExecuteExA
ShellExecuteA
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoCreateGuid
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
oleaut32
SysStringLen
SysAllocString
VariantClear
VariantCopy
SysFreeString
SysAllocStringLen
powrprof
SetSuspendState
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shlwapi
StrCpyNW
StrChrW
StrCmpW
StrCatW
StrRChrW
PathAppendA
PathRemoveFileSpecW
PathFileExistsA
PathIsDirectoryW
StrCpyW
PathFileExistsW
PathAppendW
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 688KB - Virtual size: 687KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ