Static task
static1
Behavioral task
behavioral1
Sample
5ad80b6714f2e9f06ec44e97db9ed851.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ad80b6714f2e9f06ec44e97db9ed851.exe
Resource
win10v2004-20231222-en
General
-
Target
5ad80b6714f2e9f06ec44e97db9ed851
-
Size
113KB
-
MD5
5ad80b6714f2e9f06ec44e97db9ed851
-
SHA1
0531cca29b03a46635ab096a4629176bf723eeb0
-
SHA256
e4fe2745ba25541c3bca4795aaabd640bca3160fe6e3e3749b889ead38769e14
-
SHA512
db068bee9e23971aa19314b805a0fa1922aa6f66076f7830a758dbede86bf74f89ddaf07d80b589e3ef5f6603ff62aeeb69c28e14f879954f5ffbd5309692163
-
SSDEEP
3072:soNWey0Xxxt/Og1qOWGCLhQg5+G1fh5Hinr:LNvbtPqa2h3Tur
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ad80b6714f2e9f06ec44e97db9ed851
Files
-
5ad80b6714f2e9f06ec44e97db9ed851.exe windows:5 windows x86 arch:x86
650511a49cc8ed8d6696813dcc428730
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetCurrentProcess
QueryPerformanceCounter
lstrcatA
GetLastError
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
GetTempPathA
lstrcpyA
lstrcmpA
GetCurrentProcessId
GetTickCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
user32
wsprintfA
GetWindowRect
ClientToScreen
InflateRect
GetCursorPos
IsWindowVisible
EqualRect
gdi32
GetBkColor
GetBkMode
msvcrt
_ismbblead
__getmainargs
_cexit
_exit
_XcptFilter
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
__p__commode
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE