Static task
static1
Behavioral task
behavioral1
Sample
57b514624afd20ba7ca5cb010fa8fb4e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57b514624afd20ba7ca5cb010fa8fb4e.exe
Resource
win10v2004-20231215-en
General
-
Target
57b514624afd20ba7ca5cb010fa8fb4e
-
Size
184KB
-
MD5
57b514624afd20ba7ca5cb010fa8fb4e
-
SHA1
120a368d730a25936f2034c34550090b0ce76b60
-
SHA256
e15c85cce20e9c4fb2d19f2b515752b4f6b072f84fbf4ab2aa644f58237d4e04
-
SHA512
b62d3230795de4a34ca644476e1a281953179d402ac2ccaa9e6077f2962c216a0f2f4a11ed07e8bf5c5a1595c5a6f73e98e9cb2909b97cb49d06c89e7c52869c
-
SSDEEP
1536:yi1fIQSuNl17EGt4Bse/DJMwvvixjKps9ySQ1V6x5gLAO9tc9JOFiz+6Q2v3XkJ8:dRW24se/DJ9ix2pMyJ1VvltkZdQ2PXaq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57b514624afd20ba7ca5cb010fa8fb4e
Files
-
57b514624afd20ba7ca5cb010fa8fb4e.exe windows:4 windows x86 arch:x86
912a7808f00c8cfaf7ff35e2c57d9918
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
GetProcAddress
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetStartupInfoA
GetModuleHandleA
CreateFileA
Sleep
GetVersionExA
GetFileAttributesExA
SetFileTime
CloseHandle
GetSystemDirectoryA
GetModuleFileNameA
WinExec
GetLastError
user32
DefWindowProcA
PostQuitMessage
SendMessageTimeoutA
CreateWindowExA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DispatchMessageA
GetDesktopWindow
TranslateMessage
ShowWindow
RegisterClassExA
RegisterWindowMessageA
GetMessageA
advapi32
RegQueryValueExA
OpenSCManagerA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
DeleteService
OpenServiceA
StartServiceA
CreateServiceA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
strstr
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
time
srand
_access
__CxxFrameHandler
_strlwr
fclose
fflush
fwrite
fopen
sprintf
??3@YAXPAX@Z
rand
??2@YAPAXI@Z
wcslen
atoi
strchr
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ