Static task
static1
Behavioral task
behavioral1
Sample
b51c14cf6158a22aa7fe371f0e16d91ceded4b937f5b274254134dd6b94298ad.exe
Resource
win7-20230831-en
General
-
Target
b51c14cf6158a22aa7fe371f0e16d91ceded4b937f5b274254134dd6b94298ad
-
Size
300KB
-
MD5
d52648a3186ee1c853450ac2a2bed50a
-
SHA1
20baed7b0920b9c131288e4f93da2a0e8cf29fb9
-
SHA256
b51c14cf6158a22aa7fe371f0e16d91ceded4b937f5b274254134dd6b94298ad
-
SHA512
a9e1485efa2931bb59c855c928b41f660c1d3791be1ea140c6c79a4f608301fa022ccc37ddebaf94088252a8871d88e16124445a8aacc153d568fc079ad2f77f
-
SSDEEP
3072:UMZHm4OQQoO61upZOh9Gsc51TtkcrDrZY7yh/tI+otEHnAwrK29LnBO8J:BG3oO61KZOrk7kcrZY7y5tIztQO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b51c14cf6158a22aa7fe371f0e16d91ceded4b937f5b274254134dd6b94298ad
Files
-
b51c14cf6158a22aa7fe371f0e16d91ceded4b937f5b274254134dd6b94298ad.exe windows:5 windows x86
6d41cb748e4d1fea5be7cc98b4681858
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetDriveTypeW
BuildCommDCBAndTimeoutsA
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
MoveFileExW
InterlockedDecrement
CreateJobObjectW
SetHandleInformation
GetProfileStringW
AddConsoleAliasW
SetVolumeMountPointW
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasExesW
EnumTimeFormatsA
EnumTimeFormatsW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
TerminateThread
FatalAppExitW
GetCalendarInfoW
GetStartupInfoW
CreateMailslotW
RaiseException
GetPrivateProfileIntW
InterlockedExchange
SetLocaleInfoA
SetThreadLocale
GetLastError
GetCurrentDirectoryW
BackupRead
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
OpenMutexA
GetProcessId
LocalAlloc
GetNumberFormatW
GlobalGetAtomNameW
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
VirtualProtect
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
OpenSemaphoreW
FindFirstVolumeA
FindAtomW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DeleteFileW
CreateFileW
ReadFile
FlushFileBuffers
FindFirstFileW
GetCommandLineW
SetDefaultCommConfigA
GetFileSize
GetComputerNameA
GetStartupInfoA
WriteConsoleW
SetStdHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DeleteFileA
HeapSetInformation
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleMode
HeapReAlloc
LCMapStringW
CloseHandle
user32
GetComboBoxInfo
CharUpperW
gdi32
GetBoundsRect
GetTextFaceW
SelectPalette
advapi32
LookupAccountSidW
shell32
DragFinish
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ