Static task
static1
Behavioral task
behavioral1
Sample
5c139365a7e7e806a36048c9a3b4375ed97f133899ca4b953b0c3a1040be79c5.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5c139365a7e7e806a36048c9a3b4375ed97f133899ca4b953b0c3a1040be79c5.exe
Resource
win10v2004-20231023-en
General
-
Target
5c139365a7e7e806a36048c9a3b4375ed97f133899ca4b953b0c3a1040be79c5
-
Size
85KB
-
MD5
ac1ed51c0bdd7d14ac44d8871140702e
-
SHA1
810a37ef97990894927d00ff96fec4893730a98c
-
SHA256
5c139365a7e7e806a36048c9a3b4375ed97f133899ca4b953b0c3a1040be79c5
-
SHA512
ce6a502d0e486fad01679b3bddd045d02149f7038d881124ce99942fbfc670d8167f8465dd002516abf71e4486377e5808a485cc273159a0ace3faea1828fc95
-
SSDEEP
1536:M96ynyFuWFtmO46dj/tf+OZEtckaTP5nMBuONn+RfV43b/ZuzG1P3N2Uhy0:I6LuQoO46F/pstBaDqwONnct43bBl3Nb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c139365a7e7e806a36048c9a3b4375ed97f133899ca4b953b0c3a1040be79c5
Files
-
5c139365a7e7e806a36048c9a3b4375ed97f133899ca4b953b0c3a1040be79c5.exe windows:5 windows x86
8e880840a6362650b951807ebcc1e95a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CertFindCertificateInStore
CertOpenStore
CertCreateCertificateContext
CertAddCertificateContextToStore
CertCloseStore
CryptStringToBinaryA
mfc90
ord12384
ord6462
ord1137
ord310
ord13174
ord9952
ord10437
ord10284
ord13116
ord12145
ord12597
ord7746
ord9945
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord8432
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4197
ord1098
ord4667
ord9252
ord601
ord7312
ord7118
ord4952
ord4029
ord800
ord1276
msvcr90
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__CxxFrameHandler3
sprintf
memset
_setmbcp
kernel32
InterlockedCompareExchange
GetLastError
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
OutputDebugStringA
comctl32
InitCommonControlsEx
msvcp90
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ