Static task
static1
Behavioral task
behavioral1
Sample
5e52e2ec2e8059cc447b81c709b928f7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e52e2ec2e8059cc447b81c709b928f7.exe
Resource
win10v2004-20231215-en
General
-
Target
5e52e2ec2e8059cc447b81c709b928f7
-
Size
3.3MB
-
MD5
5e52e2ec2e8059cc447b81c709b928f7
-
SHA1
b57e71ba0c42ff03ffe34b74f853f941769da77e
-
SHA256
0370f445cca6a47eabafb2a69d844224f6b2e810eb2b97d27c86c4ffbae58085
-
SHA512
0dd5b717fd58e21ac87a5adb2e373e1a0d92754029eb4558b9e093cb96497141e7122fc81dc4373864cf85a82d65950dc9202db2bc4d5c170bed559bb8033f90
-
SSDEEP
49152:KKSeY4KRInYMDet6QqMzP5liYJ7LnqqkiIzAqiYqAA4F6IF4ztyIh/WeK79ciLLr:jSh6L+P5d7LJ2qAX6btyI4h+syY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e52e2ec2e8059cc447b81c709b928f7
Files
-
5e52e2ec2e8059cc447b81c709b928f7.exe windows:6 windows x64 arch:x64
f8e0b40d6cd24dcf20477ae60887cac1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateDirectoryW
SizeofResource
HeapFree
lstrlenW
WriteFile
OutputDebugStringA
TerminateProcess
GetModuleFileNameW
CreateFileW
GetFileAttributesW
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetLastError
Process32NextW
lstrcatW
LockResource
DeleteFileW
Process32FirstW
CloseHandle
LoadLibraryW
CreateThread
LoadResource
FindResourceW
HeapAlloc
GetProcAddress
GetProcessHeap
CreateProcessW
GetModuleHandleW
CopyFileW
lstrcpyW
CreateProcessA
GetConsoleWindow
WriteConsoleW
HeapSize
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
SetStdHandle
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
CreateFileA
GetFileTime
LocalFileTimeToFileTime
SetFileTime
DosDateTimeToFileTime
ReadFile
SetFilePointer
FindClose
LocalFree
FormatMessageA
GetStringTypeW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
MoveFileExW
GetFileInformationByHandleEx
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetModuleHandleExW
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileSizeEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
RtlUnwind
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ShowWindow
GetProcessWindowStation
GetUserObjectInformationW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
wininet
InternetOpenW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetConnectW
InternetReadFile
urlmon
URLDownloadToFileW
dxgi
CreateDXGIFactory
Sections
.text Size: - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
J.Crew C Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
J.Crew C Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
J.Crew C Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ