Static task
static1
Behavioral task
behavioral1
Sample
56d7ea0d33d4eb5beeada0c4abb2ecaf72b69c9523674d994442906757533bc9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
56d7ea0d33d4eb5beeada0c4abb2ecaf72b69c9523674d994442906757533bc9.exe
Resource
win10-20231020-en
General
-
Target
56d7ea0d33d4eb5beeada0c4abb2ecaf72b69c9523674d994442906757533bc9
-
Size
260KB
-
MD5
7eb1a5e4920bfc9ffbf558a5cacc16e4
-
SHA1
c58f928b02878c804ea386c56421cd1663d3f083
-
SHA256
56d7ea0d33d4eb5beeada0c4abb2ecaf72b69c9523674d994442906757533bc9
-
SHA512
9b9a929148c088be63af147c438b8cbfa6459e98df64dceeb38a05a361b6090b1626cef3e253def8eabb4d87880d093ae4935d2c49e58563e4d4305be1d3f55b
-
SSDEEP
3072:tvABN6GnyOjUJGlFSmNaq3KxCtFJ8AMizB2BYBfj3zfmO:tgJyOjsGLSmNaqPB8z2b3Lh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56d7ea0d33d4eb5beeada0c4abb2ecaf72b69c9523674d994442906757533bc9
Files
-
56d7ea0d33d4eb5beeada0c4abb2ecaf72b69c9523674d994442906757533bc9.exe windows:5 windows x86
87bb85280d56158859c1c42d02178700
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleInputW
GetLocaleInfoA
GetCPInfo
FindResourceExW
FindResourceW
BuildCommDCBAndTimeoutsA
DeleteVolumeMountPointA
WaitNamedPipeA
SetDefaultCommConfigW
GetEnvironmentStringsW
GetModuleHandleExW
CreateHardLinkA
SetTapeParameters
GetModuleHandleW
ConvertFiberToThread
GetConsoleAliasExesW
EnumTimeFormatsA
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
FatalAppExitW
ReadConsoleInputA
CopyFileW
SetConsoleCP
GetFileAttributesA
SetSystemPowerState
ReadFile
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetStartupInfoW
RaiseException
GetComputerNameA
GetConsoleAliasesW
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
MoveFileW
EnumSystemCodePagesW
FreeUserPhysicalPages
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
CreateEventW
RemoveDirectoryW
HeapLock
GetCommMask
AddAtomA
FoldStringW
FindNextFileA
SetConsoleTitleW
FindNextFileW
VirtualProtect
QueryPerformanceFrequency
OpenSemaphoreW
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CommConfigDialogW
DeleteFileA
CreateFileW
WriteConsoleW
GetShortPathNameA
GetSystemDefaultLangID
FlushFileBuffers
SetStdHandle
MoveFileA
WideCharToMultiByte
HeapAlloc
GetProcAddress
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
HeapCreate
HeapFree
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
user32
CharUpperW
advapi32
AbortSystemShutdownA
shell32
DragAcceptFiles
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ