Static task
static1
Behavioral task
behavioral1
Sample
51aba6313e00300e79a70a7e6ce1f415.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51aba6313e00300e79a70a7e6ce1f415.exe
Resource
win10v2004-20231222-en
General
-
Target
51aba6313e00300e79a70a7e6ce1f415
-
Size
138KB
-
MD5
51aba6313e00300e79a70a7e6ce1f415
-
SHA1
4148625f74e8d4601c9a3395866d9f25a9bd4a08
-
SHA256
e308ab04c73f5b861085c96d31f294a98519e4cb9656d49c97f126a814706386
-
SHA512
277a5aad65df5d266798951908eb0572663b96977b4ae3fb275cad4e2351f71250d8a551fed6fff949088344ead419edff0e2e0953c23a6066b54e9166d7b359
-
SSDEEP
3072:JJuB0ODDOrtPfozibM6+27PjCX+MzoIev88oth3d:JJC/mrp+Q+27b3v8dtFd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51aba6313e00300e79a70a7e6ce1f415
Files
-
51aba6313e00300e79a70a7e6ce1f415.exe windows:5 windows x86 arch:x86
ced5d7f746be0878535b1b0d75d731c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
OpenEventW
SetEvent
GetCurrentProcessId
GetUserDefaultLangID
GetCurrentProcess
GetSystemDirectoryW
GetFileAttributesExW
lstrcmpiW
FormatMessageW
SetCurrentDirectoryW
CreateThread
SetThreadPriority
GetCurrentThread
lstrcmpW
GetLastError
LocalReAlloc
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WaitForSingleObject
GetStartupInfoA
GetModuleHandleA
DelayLoadFailureHook
ExpandEnvironmentStringsW
SearchPathW
CloseHandle
CreateProcessW
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpyW
lstrcatW
lstrlenW
SetEnvironmentVariableW
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetVersionExW
GetSystemTime
user32
CreateWindowExW
DestroyWindow
RegisterClassExW
DefWindowProcW
LoadRemoteFonts
wsprintfW
GetSystemMetrics
GetKeyboardLayout
SystemParametersInfoW
GetDesktopWindow
CharNextW
ExitWindowsEx
MessageBoxW
LoadStringW
advapi32
RegOpenKeyExA
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegCreateKeyExW
OpenProcessToken
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegQueryValueExA
RegSetValueExW
crypt32
CryptProtectData
winspool.drv
SpoolerInit
ntdll
RtlConvertSidToUnicodeString
NtClose
RtlLengthSid
RtlCopySid
_itow
RtlFreeUnicodeString
DbgPrint
wcslen
wcscpy
wcscat
wcscmp
_wcsicmp
memmove
RtlInitUnicodeString
NtOpenKey
NtQueryInformationToken
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 91KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE