Static task
static1
Behavioral task
behavioral1
Sample
5bd3fd977fa73e09d296a24e0f965610.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bd3fd977fa73e09d296a24e0f965610.exe
Resource
win10v2004-20231215-en
General
-
Target
5bd3fd977fa73e09d296a24e0f965610
-
Size
1.2MB
-
MD5
5bd3fd977fa73e09d296a24e0f965610
-
SHA1
4979589decff0077be62c16eab7e410832f04343
-
SHA256
10eaf0eb842425bb9d16bc11c5add1bb50e34ecd9f73f1ea36f9d4baef99d156
-
SHA512
4b48841388c7a7640da5009f13ca106a5a173144f863bf87f6a6df3256f18fcfbfa58bf88d5f409a8cec5e37c8780ec9517c81c07bab8bb66758b403d7a65095
-
SSDEEP
24576:JSnzjykMMtvzzdHhm65MCz0cyCWtLuirr9PaJHHq+a:Jy60zzdGW8CWMWPAqj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bd3fd977fa73e09d296a24e0f965610
Files
-
5bd3fd977fa73e09d296a24e0f965610.exe windows:5 windows x86 arch:x86
1e90359db9def72f1f10647fdcfb7f0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualAllocEx
GetLastError
ReadProcessMemory
WriteProcessMemory
GetThreadContext
SetThreadContext
ResumeThread
LoadResource
SizeofResource
GetModuleFileNameA
GetModuleHandleA
CreateProcessA
FindResourceW
FindResourceExW
MultiByteToWideChar
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapReAlloc
GetProcAddress
HeapSize
GetProcessHeap
CreateFileW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryExW
LockResource
InterlockedDecrement
HeapFree
InitializeCriticalSectionAndSpinCount
FreeLibrary
InterlockedExchange
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FatalAppExitA
IsDebuggerPresent
Sleep
IsProcessorFeaturePresent
CreateSemaphoreW
GetModuleHandleW
lstrlenA
WideCharToMultiByte
LocalFree
lstrlenW
GetCommandLineW
EncodePointer
DecodePointer
RtlUnwind
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetStdHandle
WriteFile
GetModuleFileNameW
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
LoadIconW
LoadCursorW
EndPaint
BeginPaint
UpdateWindow
MessageBoxW
LoadStringW
LoadAcceleratorsW
EndDialog
DialogBoxParamW
ShowWindow
TranslateAcceleratorW
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyWindow
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoSetProxyBlanket
shell32
ShellExecuteW
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SetErrorInfo
VariantChangeType
VariantInit
VariantClear
SysAllocString
GetErrorInfo
CreateErrorInfo
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 999KB - Virtual size: 998KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ