Static task
static1
Behavioral task
behavioral1
Sample
d5c48236a5de2d68e64f40c685e9b3e583d0d73d5457331f1332809efae1c79d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d5c48236a5de2d68e64f40c685e9b3e583d0d73d5457331f1332809efae1c79d.exe
Resource
win10v2004-20231215-en
General
-
Target
d5c48236a5de2d68e64f40c685e9b3e583d0d73d5457331f1332809efae1c79d
-
Size
324KB
-
MD5
c17eecabcc478ec9761143ac39d5fd49
-
SHA1
6a00b754fbdd81b8378ea95ad2402056cf2e4b7c
-
SHA256
d5c48236a5de2d68e64f40c685e9b3e583d0d73d5457331f1332809efae1c79d
-
SHA512
8ce968107bf2134658df857bc246565fd0fdf6f02973d66557eac676e6f07874c96441ba6fd6e90b1b1bf5e8a6ba1631a34398ff0da8fb83d3e1777f62f0b505
-
SSDEEP
6144:T3IF2wpuBBI4tStmnyD/nyW7qifJbQQuHyan7CK82O:T3KCStqyznyW7Lludp8V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5c48236a5de2d68e64f40c685e9b3e583d0d73d5457331f1332809efae1c79d
Files
-
d5c48236a5de2d68e64f40c685e9b3e583d0d73d5457331f1332809efae1c79d.exe windows:4 windows x86 arch:x86
4af6d393075bb8c9603ab5965b2fe166
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
GetCurrentProcess
GetFullPathNameA
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
Sleep
FlushFileBuffers
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
FileTimeToLocalFileTime
FindNextFileA
FormatMessageA
LocalFree
MulDiv
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetCurrentProcessId
SetLastError
GlobalAddAtomA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
ExitProcess
VirtualFree
VirtualAlloc
LoadLibraryA
GetProcAddress
CreateDirectoryA
FindClose
FindFirstFileA
GetVersion
CompareStringA
GetLastError
InterlockedExchange
lstrlenW
MultiByteToWideChar
CompareStringW
lstrlenA
GetTickCount
SystemTimeToFileTime
UnmapViewOfFile
WriteFile
CloseHandle
CreateFileA
ReadFile
SetFilePointer
GetFileSize
FileTimeToSystemTime
FindResourceA
LoadResource
LockResource
SizeofResource
GetACP
WideCharToMultiByte
user32
ShowWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetWindowThreadProcessId
LoadIconA
GetSystemMenu
AppendMenuA
IsIconic
GetSystemMetrics
GetClientRect
GetLastActivePopup
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
UnregisterClassA
GetSysColorBrush
LoadCursorA
DrawIcon
SendMessageA
EnableWindow
GetDesktopWindow
wsprintfA
PostMessageA
PostQuitMessage
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetDeviceCaps
CreateBitmap
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ