Static task
static1
Behavioral task
behavioral1
Sample
5e6ad6abc07ced58e1946995fcbc28e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5e6ad6abc07ced58e1946995fcbc28e4.exe
Resource
win10v2004-20231215-en
General
-
Target
5e6ad6abc07ced58e1946995fcbc28e4
-
Size
643KB
-
MD5
5e6ad6abc07ced58e1946995fcbc28e4
-
SHA1
8b15b6726ab0567ba2b37115f15227fb86b2a2be
-
SHA256
30b81c0310d0395c4e029cf6f70caed04ce48870b0862e12995d7a8e0dc3a4a2
-
SHA512
cd2e3c1f5549d5451fa1ad82096e7267c0d7d8e066e3c491b7d5fb21f1bb389cf8c987d9b49c59133f755ef5fa94188df6671ddb49cf59dc72495d41be44760e
-
SSDEEP
12288:s1gX9XmIXMcmVoUtzBhpbC0lZSfYx1JbYRekkIRQRvEtIvNb/1oLfo25:s1ucBoUtzBPb3lwE6s/KtcNb1oLfoq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e6ad6abc07ced58e1946995fcbc28e4
Files
-
5e6ad6abc07ced58e1946995fcbc28e4.exe windows:5 windows x64 arch:x64
ae2b1fa18004c5b721950483a096bdfe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapFree
HeapQueryInformation
HeapReAlloc
HeapSize
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetStdHandle
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapAlloc
GetFileType
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStartupInfoA
GetCommandLineA
GetProcessHeap
RtlPcToFileHeader
RaiseException
RtlUnwindEx
RtlLookupFunctionEntry
SetErrorMode
GetModuleHandleW
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
TlsGetValue
LocalAlloc
FormatMessageA
LocalFree
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
GetFileAttributesA
GlobalFree
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
GlobalAlloc
FreeResource
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
GetCurrentProcessId
GlobalGetAtomNameA
GlobalAddAtomA
GetLastError
MultiByteToWideChar
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
SetLastError
lstrlenA
lstrcmpA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteFileA
Sleep
LoadLibraryA
GetProcAddress
ExitProcess
CreateFileA
WriteFile
SetHandleCount
CloseHandle
user32
GetSysColorBrush
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UnregisterClassA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
GetCursorPos
CreateWindowExA
GetClientRect
GetWindowRect
PtInRect
GetClassNameA
DestroyMenu
WinHelpA
SetWindowPos
SetFocus
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
GetDlgItem
EnableWindow
LoadCursorA
SetCursor
GetDlgCtrlID
GetKeyState
LoadIconA
PeekMessageA
SetActiveWindow
IsWindowVisible
UpdateWindow
IsIconic
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetCapture
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SendMessageA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetDC
ReleaseDC
BeginPaint
GetClassInfoA
CopyRect
GetMenu
GetLastActivePopup
PostMessageA
SetMenu
GetDesktopWindow
GetWindowLongA
ShowWindow
GetWindow
IsWindow
GetSysColor
EndPaint
MessageBoxA
gdi32
GetDeviceCaps
GetStockObject
DeleteDC
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
ScaleViewportExtEx
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHChangeNotify
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 391KB - Virtual size: 414KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ