Static task
static1
Behavioral task
behavioral1
Sample
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe
Resource
win10-20231025-en
General
-
Target
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
-
Size
221KB
-
MD5
6a5328207dfc2885b6976339c6df2f36
-
SHA1
119bda84754b0b13d63a668d5e29b8e1d09ba8eb
-
SHA256
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
-
SHA512
c489767e5cd1b6d07fa0328d8bfb0cefe0c299f6c8b482340c97d357cd6b8b8fbd7c5446096ebe3d646106eac927df18c0d3790b51ab216259452762bd46c2e0
-
SSDEEP
6144:Kos7DjeAarEIZeHJPlTGB5Po2clXxy0mmLEw:kDqAarEI0H7go2c2V6Ew
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
Files
-
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe windows:5 windows x86
83d8e90beab47f385f1b6d53f3196e3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocConsole
GlobalCompact
WriteConsoleOutputCharacterA
ReadConsoleA
WaitNamedPipeA
GetEnvironmentStringsW
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
OpenSemaphoreA
GetFileAttributesExA
SetTapeParameters
GetModuleHandleW
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
GetConsoleAliasExesW
FindActCtxSectionStringA
SetCommState
GetDriveTypeA
AddRefActCtx
GlobalFindAtomA
LoadLibraryW
SetCommConfig
CopyFileW
_hread
CreateEventA
SetConsoleCP
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
SetSystemPowerState
TerminateProcess
GetCompressedFileSizeA
GetTimeZoneInformation
lstrlenW
FindNextVolumeMountPointW
GetStartupInfoW
WriteConsoleInputW
GetTempPathW
GetShortPathNameA
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetCurrentDirectoryW
SetLastError
EnumSystemCodePagesW
SetStdHandle
GlobalGetAtomNameA
LoadLibraryA
LocalAlloc
MoveFileA
AddVectoredExceptionHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
GlobalGetAtomNameW
GetCurrentConsoleFont
FoldStringA
FindNextFileA
FindFirstChangeNotificationA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
GetFileTime
QueryPerformanceFrequency
FatalAppExitA
FindAtomW
DeleteFileW
MoveFileWithProgressW
AddConsoleAliasA
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
WriteConsoleW
SetLocaleInfoA
ReplaceFileA
GetNumaNodeProcessorMask
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
SetFilePointer
CloseHandle
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpGetProxyForUrl
WinHttpReadData
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ