Static task
static1
Behavioral task
behavioral1
Sample
5048582704f41a09f4c1ebe1f3820031.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5048582704f41a09f4c1ebe1f3820031.exe
Resource
win10v2004-20231215-en
General
-
Target
5048582704f41a09f4c1ebe1f3820031
-
Size
3.3MB
-
MD5
5048582704f41a09f4c1ebe1f3820031
-
SHA1
189b684c9a0cff9d0905861b938a182e30701262
-
SHA256
e9f65333fbe2ac78edbc69ae306ac041bedad8d919d3e9348860df3d9fe8bdb9
-
SHA512
ffa50f6321d5770dc08974b03223e6781ae4d2c682561f1d59ba2424f1305cb9f38e7bebfdc9b3918ba6bad1c9e68ee04f6e48a0a8ca2bb3858c819ec0723b28
-
SSDEEP
49152:0vIVdG6woKOBBxQpeaus+PFHow6VjTbxwD9T/VzPiQn5skJnoMCOzV:g6wbHIC+1ow6ZfxwDt/lXXN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5048582704f41a09f4c1ebe1f3820031
Files
-
5048582704f41a09f4c1ebe1f3820031.exe windows:4 windows x86 arch:x86
afec45408a6f5b3ca11f5c6bf0588697
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
gethostbyname
send
WSAStartup
socket
inet_addr
connect
recv
closesocket
kernel32
GetThreadLocale
SizeofResource
LockResource
LoadResource
FreeLibrary
LoadLibraryExA
FindResourceA
FindResourceExA
GetVolumeInformationA
WriteFile
CreateFileA
GetSystemDirectoryA
DeleteFileA
GetCommandLineA
SetFileAttributesA
GetModuleFileNameA
GetCurrentDirectoryA
GetDriveTypeA
GetLogicalDrives
SetThreadPriority
CreateThread
CreateEventA
SetEvent
WaitForSingleObject
GetTempPathA
MultiByteToWideChar
RaiseException
InitializeCriticalSection
DeleteCriticalSection
MulDiv
GetLocaleInfoA
GetFileType
DuplicateHandle
ReadFile
SystemTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryA
SetFileTime
lstrcpynA
GetStdHandle
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualFree
HeapCreate
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
ExitProcess
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetACP
InterlockedExchange
GetVersionExA
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
GetLastError
WideCharToMultiByte
GetModuleHandleA
GetProcAddress
lstrcpyA
lstrlenA
CloseHandle
GetEnvironmentStringsW
SetHandleCount
LoadLibraryA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
user32
LoadCursorA
RegisterClassA
SetWindowRgn
SetWindowLongA
GetDesktopWindow
GetWindowRect
ReleaseDC
GetDC
wsprintfA
MoveWindow
GetCursorPos
PtInRect
SendMessageA
ShowWindow
SetTimer
KillTimer
SetWindowPos
BeginPaint
FillRect
DrawTextA
EndPaint
LoadBitmapA
DestroyWindow
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
RegisterClassExA
PostQuitMessage
DefWindowProcA
MessageBoxA
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
PostMessageA
gdi32
LineTo
SetBkMode
MoveToEx
DeleteObject
GetDeviceCaps
SelectObject
CreatePen
CreateSolidBrush
DeleteDC
BitBlt
CreateCompatibleDC
CreatePolygonRgn
SetTextColor
CreateFontA
GetStockObject
advapi32
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
shell32
ShellExecuteExA
ShellExecuteA
ole32
OleInitialize
OleUninitialize
shlwapi
PathFileExistsA
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ