Static task
static1
Behavioral task
behavioral1
Sample
df5920fa7e08cc7dad0882020b524f88ebc9579780a58b0b431ee36e0e3074a6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
df5920fa7e08cc7dad0882020b524f88ebc9579780a58b0b431ee36e0e3074a6.exe
Resource
win10v2004-20230915-en
General
-
Target
df5920fa7e08cc7dad0882020b524f88ebc9579780a58b0b431ee36e0e3074a6.exe
-
Size
200KB
-
MD5
52e7b159b13e756bf4ed7cb16664a008
-
SHA1
9657ca915e51750dbc93d00e4d20bc190add7844
-
SHA256
df5920fa7e08cc7dad0882020b524f88ebc9579780a58b0b431ee36e0e3074a6
-
SHA512
be0d64e2f303961a8414949731920b707bd6bb132e60e4699f7afe5b512e2c117e5a4f9ff6011971147a989d538fa08823224549c67a1685c5c30ffaafc13aa3
-
SSDEEP
3072:bjQgjwASMrYRL9xNg2WvKpRsDCEQUbVu8JGYg1Yv/O/j2H3HnBBFYvQd2a:v9+AvyRw/bVuaGckj2XHaa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df5920fa7e08cc7dad0882020b524f88ebc9579780a58b0b431ee36e0e3074a6.exe
Files
-
df5920fa7e08cc7dad0882020b524f88ebc9579780a58b0b431ee36e0e3074a6.exe.exe windows:5 windows x86
e2923526c1025bf81115648776bcac8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeMountPointClose
DebugBreakProcess
GetFileType
InitAtomTable
SetSystemTimeAdjustment
CreateFileW
LoadModule
WinExec
lstrlenA
GetLastError
MultiByteToWideChar
LCMapStringW
SetEvent
HeapAlloc
HeapSize
WideCharToMultiByte
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
LoadLibraryW
GlobalAlloc
SetTapeParameters
LocalLock
LoadLibraryA
lstrcpyA
lstrcatA
GetProcAddress
GetDriveTypeW
WriteProfileSectionW
WritePrivateProfileStringW
HeapReAlloc
PeekConsoleInputA
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
user32
InsertMenuItemA
CreateMDIWindowW
LoadCursorW
GrayStringA
AppendMenuW
ClientToScreen
SetPropA
GetInputState
GetDC
ReplyMessage
SetClassLongA
DrawAnimatedRects
GetWindowTextLengthW
CloseWindow
SetWindowsHookW
GetWindowTextA
gdi32
GetTextExtentPointW
Ellipse
GetTextMetricsA
CreateRoundRectRgn
GetDeviceGammaRamp
LineDDA
GetPolyFillMode
CheckColorsInGamut
GetLogColorSpaceA
advapi32
ReportEventA
ole32
CoInitialize
OleMetafilePictFromIconAndLabel
OleSetMenuDescriptor
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ