Static task
static1
Behavioral task
behavioral1
Sample
5c5d4bd87d7b745e2cdc55a49f53bc046e58c1f31354c838911201bec87f603f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5c5d4bd87d7b745e2cdc55a49f53bc046e58c1f31354c838911201bec87f603f.exe
Resource
win10v2004-20231023-en
General
-
Target
5c5d4bd87d7b745e2cdc55a49f53bc046e58c1f31354c838911201bec87f603f
-
Size
352KB
-
MD5
f07510fa8e1f8ce752ac6135ec01a3da
-
SHA1
1324256267a9f86be260bf7bb04440e80639742f
-
SHA256
5c5d4bd87d7b745e2cdc55a49f53bc046e58c1f31354c838911201bec87f603f
-
SHA512
fc2ec701a15106fb0e466d13fc7e73e21e2ce75112ed0c1ea3ba666825205e145d5c166fd8f0cc69b3cd401d910e9bceab93a006907cce6d96b3111e592c22c4
-
SSDEEP
6144:6pWMSmgY0IyFpXjsCEqhp3xuo8Pr7Jjc7wPxNC:LHP7LFVst+0oA71+eC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c5d4bd87d7b745e2cdc55a49f53bc046e58c1f31354c838911201bec87f603f
Files
-
5c5d4bd87d7b745e2cdc55a49f53bc046e58c1f31354c838911201bec87f603f.exe windows:5 windows x86
c150d01c536cdd495c04005bc1c99ecb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
IsPwrHibernateAllowed
ReadGlobalPwrPolicy
kernel32
LoadLibraryExW
LocalFree
GetCurrentConsoleFont
AddConsoleAliasA
HeapWalk
HeapCreate
EraseTape
EnumSystemLocalesA
GetModuleHandleW
GetProcessAffinityMask
SetFileAttributesW
DeleteVolumeMountPointW
LockFile
GetLocaleInfoW
FillConsoleOutputAttribute
GetConsoleCursorInfo
GlobalFindAtomA
GetProcAddress
LoadLibraryA
GetModuleHandleA
GlobalAddAtomW
FindFirstFileA
Process32First
wininet
RetrieveUrlCacheEntryStreamW
msvcrt
memset
user32
GetWindowRect
InsertMenuA
GetClipboardFormatNameA
SetCursor
ShowCaret
IsWindow
ole32
CoFreeUnusedLibrariesEx
gdi32
GetDeviceCaps
GetObjectW
GetCharWidthW
GetPaletteEntries
GetBitmapBits
winspool.drv
FindNextPrinterChangeNotification
rpcrt4
NdrpVarVtOfTypeDesc
Sections
.rda Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExeS Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 4KB - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rda?;m Size: 4KB - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE