Static task
static1
Behavioral task
behavioral1
Sample
51bca6d5c3d4050f4cd30d365075e75a32728cf363b46a3c3d108d15465dd32f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
51bca6d5c3d4050f4cd30d365075e75a32728cf363b46a3c3d108d15465dd32f.exe
Resource
win10v2004-20231020-en
General
-
Target
51bca6d5c3d4050f4cd30d365075e75a32728cf363b46a3c3d108d15465dd32f
-
Size
765KB
-
MD5
b8b248fd5018a865c327471c660400c3
-
SHA1
7a82a6b5ecf7d9751a66d182fe428ff965ffa875
-
SHA256
51bca6d5c3d4050f4cd30d365075e75a32728cf363b46a3c3d108d15465dd32f
-
SHA512
39210266eb51f1ae39b1e3a93bfaaa4d1571a3cf0b3ee73b2f944a1abd399ed4092b17e831c3fe05aca82196c24f590cdc9a99bd0af50558113d516209ea258a
-
SSDEEP
12288:S+KR485Rg+Kf2VkCXA7JJ8tLCqffyhMD9WPSHArCzrEJgHZOyxJX3vUzZs50cXPY:9sb3vUd+0lRgPG8ik/qUFXha
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51bca6d5c3d4050f4cd30d365075e75a32728cf363b46a3c3d108d15465dd32f
Files
-
51bca6d5c3d4050f4cd30d365075e75a32728cf363b46a3c3d108d15465dd32f.exe windows:5 windows x86
7cb300e0af3f9134d947395bbeeb74b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
Sleep
OpenMutexW
WaitForSingleObject
MapViewOfFile
CreateFileMappingW
SetEvent
GetLastError
CreateEventW
UnmapViewOfFile
OpenEventW
VirtualQuery
GetCurrentProcessId
GetLocalTime
CloseHandle
GetCurrentThreadId
InterlockedExchange
CreateFileW
EncodePointer
DecodePointer
RaiseException
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
FormatMessageW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
QueryPerformanceCounter
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
QueryDosDeviceW
SearchPathW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
LocalFree
ResetEvent
GetACP
MultiByteToWideChar
CreateMutexW
ReleaseMutex
InitializeCriticalSection
GetVersionExW
LockResource
LoadResource
FindResourceW
lstrcmpiW
TerminateProcess
FindNextFileW
FindClose
ReadFile
GetFileSize
CreateDirectoryW
GetFullPathNameW
lstrlenW
SetFilePointer
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryW
GetTempFileNameW
HeapFree
HeapAlloc
GetProcessHeap
GetLogicalDriveStringsW
LoadLibraryW
FreeLibrary
LoadLibraryExW
InterlockedExchangeAdd
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
UnregisterWait
UnregisterWaitEx
ReadProcessMemory
GetProcessTimes
RegisterWaitForSingleObject
CreateNamedPipeW
DisconnectNamedPipe
GetOverlappedResult
ConnectNamedPipe
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitProcess
GetStdHandle
GetStringTypeW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
HeapSize
HeapReAlloc
Thread32Next
Thread32First
SuspendThread
CreateToolhelp32Snapshot
OpenThread
GetModuleFileNameW
WriteFile
GetTickCount
WaitForMultipleObjects
GlobalMemoryStatusEx
RemoveDirectoryW
OpenProcess
user32
GetWindowThreadProcessId
FindWindowExW
IsIconic
ShowWindow
SendMessageW
IsWindowVisible
IsWindow
SetForegroundWindow
advapi32
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
psapi
GetProcessMemoryInfo
Sections
.text Size: 447KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ