Static task
static1
Behavioral task
behavioral1
Sample
5b3f63351d9f7b4489b6c1dc6b56f69fc60a962b3f2315c9d1bbac5d88c1fb68.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5b3f63351d9f7b4489b6c1dc6b56f69fc60a962b3f2315c9d1bbac5d88c1fb68.exe
Resource
win10v2004-20230915-en
General
-
Target
5b3f63351d9f7b4489b6c1dc6b56f69fc60a962b3f2315c9d1bbac5d88c1fb68
-
Size
772KB
-
MD5
a91b0bd341a2e5820243b33b87cfe12b
-
SHA1
562ef1bb00cc311801a6d62daa2de2ab059e3748
-
SHA256
5b3f63351d9f7b4489b6c1dc6b56f69fc60a962b3f2315c9d1bbac5d88c1fb68
-
SHA512
29859f3d7110948d5eca311f1f2cac3078de4395ae1b1e4c35124790c6414d9c9358297ae0604db5a932dbb3e2f318990dcab3540aacb2fa469e6aaca3281bf9
-
SSDEEP
24576:11PND9ATiW/0p/XB5MUKH0IY/L1NuX4V3a604XvDLSWyF/ThHNLoEk3CsINVpB/N:1RND9ATr/0p/XB5MUKH0IY/L1NuX4V3Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b3f63351d9f7b4489b6c1dc6b56f69fc60a962b3f2315c9d1bbac5d88c1fb68
Files
-
5b3f63351d9f7b4489b6c1dc6b56f69fc60a962b3f2315c9d1bbac5d88c1fb68.exe windows x86
37186a4cc9e615795214aae2aa0246f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GetCurrentProcess
ReadFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFileAttributesA
RtlUnwind
RaiseException
HeapFree
HeapAlloc
HeapReAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
GetOEMCP
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcpynA
GetLastError
MulDiv
SetLastError
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
RemoveDirectoryA
Sleep
lstrlenA
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
GetLocalTime
FileTimeToSystemTime
WriteFile
SetFileTime
CreateDirectoryA
LocalFileTimeToFileTime
CloseHandle
CreateFileA
SystemTimeToFileTime
TerminateProcess
CopyFileA
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
GetDesktopWindow
CreateDialogIndirectParamA
UnregisterClassA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
SetBkColor
SetTextColor
GetClipBox
GetStockObject
SelectObject
RestoreDC
SaveDC
CreateBitmap
DeleteDC
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
Sections
.text Size: 392KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ