Static task
static1
Behavioral task
behavioral1
Sample
57af736a80a18392fba57a04bc0ed1d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57af736a80a18392fba57a04bc0ed1d6.exe
Resource
win10v2004-20231215-en
General
-
Target
57af736a80a18392fba57a04bc0ed1d6
-
Size
843KB
-
MD5
57af736a80a18392fba57a04bc0ed1d6
-
SHA1
eb8e6bfc1b15635178a0f9a2b9d30b53a3cf02ed
-
SHA256
75bd5fbb060a19f8242598fb6ff060f10ea8b1ed611440e853e43b3ab285a77a
-
SHA512
ac76932d5b65e09a7d322aa8f88773717ae6254902c5133b8e0e0e75b4a56f04b99220ef313df7afcff253471120cfaf875ebc7d228d71de56c82d694ca5eca6
-
SSDEEP
12288:4xAJn0Yo2laMye1fuPi135nRtPlXD3nBgUgj3v02DE7H9ZCfXVrsVE2rLES/kiik:gAR0j0J0PiJ5nvVbgj/HU94rkLES
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57af736a80a18392fba57a04bc0ed1d6
Files
-
57af736a80a18392fba57a04bc0ed1d6.exe windows:5 windows x86 arch:x86
10452b25ef2ff988e143a41a3cf9cb8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
InterlockedDecrement
InterlockedExchange
CloseHandle
GlobalAlloc
FindClose
GlobalUnlock
GetSystemDirectoryA
GetModuleFileNameA
lstrlenA
GetFileSize
GlobalFree
LeaveCriticalSection
FreeLibrary
GetCurrentProcess
FlushInstructionCache
SetErrorMode
lstrcmpiA
ExitProcess
HeapAlloc
HeapCreate
LoadLibraryA
GetModuleHandleA
GetLastError
InterlockedIncrement
WaitForSingleObject
WriteFile
ReleaseMutex
GetSystemTime
SetLastError
GetSystemDefaultLangID
InitializeCriticalSection
DebugBreak
GetExitCodeProcess
GetLogicalDrives
CreateThread
GetStdHandle
GetCurrentThreadId
DeleteCriticalSection
LocalFree
ReadFile
HeapDestroy
DeviceIoControl
SystemTimeToFileTime
GlobalLock
GetWindowsDirectoryA
EnterCriticalSection
CompareStringA
user32
GetSystemMenu
TranslateMessage
GetActiveWindow
ShowWindow
GetCapture
SetForegroundWindow
DestroyWindow
GetWindow
IsWindow
ClipCursor
SetRectEmpty
KillTimer
SetTimer
GetSystemMetrics
SetCapture
GetWindowRect
SetFocus
SetWindowRgn
DeleteMenu
MsgWaitForMultipleObjects
ReleaseCapture
PostQuitMessage
MapWindowPoints
ReleaseDC
GetParent
SetRect
UnhookWindowsHookEx
FlashWindow
MonitorFromPoint
GetClientRect
GetDC
IsZoomed
EndDialog
SetWindowPos
CallNextHookEx
gdi32
OffsetRgn
GetDeviceCaps
DeleteObject
CreateRectRgnIndirect
CreateRectRgn
GetRgnBox
CombineRgn
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegOpenCurrentUser
shell32
ord4
SHGetMalloc
ord2
SHGetSpecialFolderLocation
ole32
CoUninitialize
OleUninitialize
OleInitialize
oleaut32
SysFreeString
SysStringLen
SysAllocString
VariantClear
comctl32
ord17
InitCommonControlsEx
winmm
timeGetTime
waveOutGetNumDevs
wininet
InternetAttemptConnect
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
InternetAutodial
InternetConnectW
InternetOpenW
InternetCloseHandle
setupapi
CM_Get_Device_IDW
SetupDiDestroyDeviceInfoList
CM_Get_Parent
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
secur32
DeleteSecurityContext
msvcrt
calloc
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textes Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 217KB - Virtual size: 5.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.catow Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ