Static task
static1
Behavioral task
behavioral1
Sample
5d19d8ba6de165f36b35050d787d223f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d19d8ba6de165f36b35050d787d223f.exe
Resource
win10v2004-20231215-en
General
-
Target
5d19d8ba6de165f36b35050d787d223f
-
Size
10.1MB
-
MD5
5d19d8ba6de165f36b35050d787d223f
-
SHA1
7f4dbdb5a7a7a6e0b5109143823faf001402791c
-
SHA256
5db81bdd1acd2d67024817bfe9abcb6a9286c5d182cb9c192d183cfa99b0ec48
-
SHA512
412b8eef105899c48380f39e128a2b129956fc643543a49ea0f5e8d44a14e7b65f3ea325a45f6a02e6d6669f5696900933b08924e330dc76f594e3e3d59961b4
-
SSDEEP
3072:4HcO2/v6+jfT4fQuMjSHMVr9vEddJTxhgK4h7WAk4/5DGKq:kLGv6+7IArpsdJT3SqAk6DS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d19d8ba6de165f36b35050d787d223f
Files
-
5d19d8ba6de165f36b35050d787d223f.exe windows:4 windows x86 arch:x86
a57ea20fe1dc24f8f408749dcae996df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
ExitProcess
LoadLibraryA
WinExec
CreateThread
GetCurrentThreadId
HeapAlloc
GetFileAttributesA
SetUnhandledExceptionFilter
GetWindowsDirectoryA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetProcAddress
HeapFree
GetLastError
lstrcpyA
SetLastError
GetTempPathA
lstrcmpiA
GetTickCount
FindResourceA
LoadResource
GetSystemDirectoryA
lstrcatA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
DeleteFileA
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
lstrlenA
Sleep
CreateDirectoryA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
PostQuitMessage
wsprintfA
LoadIconA
GetDesktopWindow
GetTopWindow
GetWindowRect
WindowFromPoint
CreateWindowExA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
PostThreadMessageA
SendMessageA
SetCursorPos
mouse_event
GetInputState
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateServiceA
OpenSCManagerA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
StartServiceA
OpenServiceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
msvcrt
_except_handler3
rand
strchr
strstr
realloc
malloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
_controlfp
__p__commode
??2@YAPAXI@Z
memset
strlen
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ