Static task
static1
Behavioral task
behavioral1
Sample
5eb809d493174166103ea35ac9ca45c4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5eb809d493174166103ea35ac9ca45c4.exe
Resource
win10v2004-20231215-en
General
-
Target
5eb809d493174166103ea35ac9ca45c4
-
Size
9.7MB
-
MD5
5eb809d493174166103ea35ac9ca45c4
-
SHA1
022528a59d0a94b59da6ef6cbc4b1c1ef3853fbd
-
SHA256
4af9f7c960b5cf53480e51171c97fa910062aa11a75db832416f143ff18254f1
-
SHA512
add145b5e6d8770dbc7d0ce75f01fb65d3bf8e3eb72a29bc9091cb15684a234e3413a35117571eac301f24b8b89ecd0eaa09f64c9d5feba69908a63479f0b0e7
-
SSDEEP
98304:PzusnTXUk4or6WN2IFVPIIGiiyeiZyeiqEooK:vEZor6WMIFVPIubede5Eor
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5eb809d493174166103ea35ac9ca45c4
Files
-
5eb809d493174166103ea35ac9ca45c4.exe windows:4 windows x86 arch:x86
c58b5623cdf4ed8e999d5ba183d95055
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FillRect
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
GetCursorPos
PtInRect
GetKeyState
SetForegroundWindow
BeginPaint
EndPaint
GetDesktopWindow
InvalidateRgn
SetCursor
GetDC
ReleaseDC
SetRect
HideCaret
ShowCaret
SetCaretPos
SetTimer
KillTimer
GetKeyboardState
GetKeyboardLayoutList
ToUnicodeEx
ActivateKeyboardLayout
GetKeyboardLayout
MessageBoxA
ShowWindow
SetFocus
GetSystemMetrics
DestroyWindow
TranslateMessage
GetQueueStatus
FrameRect
GetSysColor
UpdateWindow
SetScrollPos
GetUpdateRect
GetFocus
PostQuitMessage
SetScrollInfo
ShowScrollBar
CreateCaret
wsprintfA
GetClientRect
InvalidateRect
rpcrt4
UuidFromStringW
wininet
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetCreateUrlW
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetAttemptConnect
HttpQueryInfoW
HttpEndRequestW
HttpSendRequestExA
HttpOpenRequestW
InternetSetStatusCallbackW
InternetWriteFile
InternetConnectW
InternetOpenW
InternetSetOptionW
HttpSendRequestW
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetFilePointer
FtpOpenFileW
HttpSendRequestExW
wsock32
send
recv
ntohs
closesocket
WSACleanup
gethostname
WSAAsyncSelect
gethostbyaddr
getsockname
ntohl
WSACancelBlockingCall
connect
setsockopt
listen
socket
bind
htonl
htons
inet_addr
accept
WSAGetLastError
WSASetLastError
ioctlsocket
gethostbyname
WSAStartup
shutdown
ole32
CoUninitialize
CoTaskMemFree
CLSIDFromProgID
CoCreateInstance
CoCreateGuid
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
VariantInit
SysAllocString
VariantClear
kernel32
GetLocaleInfoA
SetEndOfFile
ReadFile
RtlUnwind
Sleep
SetEvent
FreeLibrary
WaitForSingleObject
ResetEvent
GetLocalTime
OpenMutexA
CreateMutexA
IsValidLocale
SetUnhandledExceptionFilter
FindClose
GetFileSize
Beep
GetCommandLineW
IsBadReadPtr
MulDiv
GetUserDefaultLCID
InterlockedDecrement
MapViewOfFile
UnmapViewOfFile
SetErrorMode
GlobalMemoryStatus
GetLogicalDrives
GetCurrentProcessId
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LoadResource
LockResource
CreateFileA
FindFirstFileA
GetWindowsDirectoryA
GetComputerNameA
GetVolumeInformationA
DeleteFileA
GetSystemDirectoryA
CopyFileA
GetExitCodeProcess
CreateProcessA
SetFileAttributesA
GetFileAttributesA
GetVersion
GetSystemDefaultLCID
GetSystemDefaultLangID
GetTimeZoneInformation
GetDriveTypeA
FindNextFileA
DeviceIoControl
DefineDosDeviceA
QueryDosDeviceA
LocalFree
CompareStringA
InterlockedExchange
FlushInstructionCache
SetLastError
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetOEMCP
GetACP
LoadLibraryA
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringA
FlushFileBuffers
SetStdHandle
GetStringTypeA
SetFilePointer
GetFileType
SetHandleCount
GetEnvironmentStrings
LocalUnlock
LocalLock
LocalAlloc
MoveFileExA
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
CloseHandle
GetLastError
HeapSize
HeapReAlloc
VirtualAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
HeapAlloc
FlushConsoleInputBuffer
FileTimeToSystemTime
FileTimeToLocalFileTime
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
IsBadCodePtr
SetEnvironmentVariableA
SetConsoleCtrlHandler
RaiseException
GetFullPathNameA
GetCurrentDirectoryA
GlobalFree
netapi32
Netbios
comctl32
CreateStatusWindowW
winspool.drv
EndDocPrinter
StartPagePrinter
WritePrinter
EndPagePrinter
ClosePrinter
gdi32
CreateSolidBrush
SelectClipRgn
SetBkMode
PatBlt
StretchBlt
SetStretchBltMode
SetTextCharacterExtra
CreateRectRgn
MoveToEx
LineTo
StartPage
EndPage
GetEnhMetaFileBits
DeleteEnhMetaFile
CloseEnhMetaFile
AbortDoc
CreatePen
PtInRegion
CreateHalftonePalette
GetDIBColorTable
SelectPalette
RealizePalette
CreatePalette
SetTextJustification
PaintRgn
CreateCompatibleBitmap
SetEnhMetaFileBits
GetEnhMetaFileHeader
PlayEnhMetaFile
GetDIBits
CombineRgn
GetStockObject
SetRectRgn
EndDoc
FrameRgn
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
CreateBitmap
SetTextColor
GetDeviceCaps
SetBkColor
Escape
GetRgnBox
BitBlt
odbc32
ord136
ord4
ord127
ord15
ord24
ord16
ord13
ord18
ord111
ord141
ord75
ord14
advapi32
RegCloseKey
CryptReleaseContext
CryptAcquireContextW
CryptAcquireContextA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
CryptGenRandom
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 304KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.4MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 277KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE