Static task
static1
Behavioral task
behavioral1
Sample
5278edc3019b5a133f0fb52335d349b5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5278edc3019b5a133f0fb52335d349b5.exe
Resource
win10v2004-20231215-en
General
-
Target
5278edc3019b5a133f0fb52335d349b5
-
Size
41KB
-
MD5
5278edc3019b5a133f0fb52335d349b5
-
SHA1
8a66571e417db11a08364b3668cb5ee600de62ca
-
SHA256
f046063d2906a4c91d2d16373f382820d487fb921182d08365912d149add98e5
-
SHA512
0677b508d081f089a48d6547a562224f157199b9a2a394e2b1a9b6358ff4198bd6f9fe8444e84ac84e528b7262b493fac88cb726bf81175f1e1c2597a10d0b34
-
SSDEEP
768:IlrKLD4aK5jBuo8pZhZSbQVUlLJE9tbb7IT:14aKV4THhZSbQVUlLJmbHIT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5278edc3019b5a133f0fb52335d349b5
Files
-
5278edc3019b5a133f0fb52335d349b5.exe windows:5 windows x86 arch:x86
0027849aac361eb923525b74def0aee9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_setmbcp
_EH_prolog
_mbscmp
strcmp
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcat
__CxxFrameHandler
strcpy
kernel32
SetErrorMode
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
user32
SendMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
AppendMenuA
GetSystemMenu
DrawIcon
GetClientRect
GetClassLongA
SetCursor
IsIconic
SetFocus
EnableWindow
GetDlgItem
SetClassLongA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RLPack Size: 22KB - Virtual size: 95KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ