Static task
static1
Behavioral task
behavioral1
Sample
5d18f3aa3804e14e5b2f5edbec2f71bc9b71cc65a5c3aecf6a0bed8e37b19ce3.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5d18f3aa3804e14e5b2f5edbec2f71bc9b71cc65a5c3aecf6a0bed8e37b19ce3.exe
Resource
win10v2004-20231023-en
General
-
Target
5d18f3aa3804e14e5b2f5edbec2f71bc9b71cc65a5c3aecf6a0bed8e37b19ce3
-
Size
320KB
-
MD5
c116edf6f280e9d157e6595338e238cd
-
SHA1
3fab180a49bdf02d24c31862928d132a833bfa16
-
SHA256
5d18f3aa3804e14e5b2f5edbec2f71bc9b71cc65a5c3aecf6a0bed8e37b19ce3
-
SHA512
a8d09ca285d7242a58184b309d27d542483a0681122883db88bc8896e34c12e47d5633cf89b225826acd519edf1fbef9f56f1af79635b9427c8714fc59008cde
-
SSDEEP
6144:bQ0BWgXYSTIPl4+6b5t6+AGUg2PGeMDv3SYjFtWDZ23:bjvLMPl+DcGU7OeIXODZQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d18f3aa3804e14e5b2f5edbec2f71bc9b71cc65a5c3aecf6a0bed8e37b19ce3
Files
-
5d18f3aa3804e14e5b2f5edbec2f71bc9b71cc65a5c3aecf6a0bed8e37b19ce3.exe windows:4 windows x86
732b2d37ac9bd7fbf5352a0b7f9febe3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetExitCodeThread
GetModuleHandleW
TerminateThread
GetProcAddress
SizeofResource
LockResource
LoadResource
FindResourceExW
GetCurrentProcessId
GetFileAttributesW
GetSystemDirectoryW
GetModuleFileNameW
GetLastError
MultiByteToWideChar
CloseHandle
WideCharToMultiByte
WriteFile
ReadFile
WritePrivateProfileStringW
SetHandleCount
GetCommandLineA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetCommandLineW
Sleep
FindResourceW
LoadLibraryW
InterlockedDecrement
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
GetTimeZoneInformation
SetFilePointer
FlushFileBuffers
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetFileType
GetStdHandle
VirtualAlloc
VirtualFree
HeapCreate
ExitProcess
GetDateFormatA
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTickCount
GetTimeFormatA
QueryPerformanceCounter
GetStartupInfoA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedCompareExchange
InterlockedIncrement
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
user32
GetWindowThreadProcessId
UnregisterClassA
FindWindowExW
PostMessageW
FindWindowW
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
CoInitialize
CoCreateInstance
CoInitializeSecurity
CLSIDFromString
CoInitializeEx
CoUninitialize
CoSetProxyBlanket
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
VariantChangeType
VariantClear
VariantInit
SysFreeString
SafeArrayDestroy
SysAllocString
VarBstrFromCy
VarUdateFromDate
shlwapi
PathAddBackslashW
PathRemoveFileSpecW
PathAppendW
StrToIntW
psapi
GetModuleFileNameExW
Sections
.text Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE