Static task
static1
Behavioral task
behavioral1
Sample
5d9a12c20fafa8f718530b4218c7509f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d9a12c20fafa8f718530b4218c7509f.exe
Resource
win10v2004-20231222-en
General
-
Target
5d9a12c20fafa8f718530b4218c7509f
-
Size
124KB
-
MD5
5d9a12c20fafa8f718530b4218c7509f
-
SHA1
abdff1d7d24e8890d222c10628fee8bbc05a5544
-
SHA256
6e842f6b013bd24ddf34d0c7790a62a1db0ce981d2bf6d81832fd94d2b897c9b
-
SHA512
a681b20759b1bc3cfce3d438fb1bb2a49c4bd302ca6765e9499222222ff7be7443ad7daafba8900b0aba78f93d0f91d301b797a4faf9fae2b07b82be1da86359
-
SSDEEP
1536:G3E4IeqCL6/5ip5WbxzCN53DJcBSvsHThNUNPdxJBKAD7ZX:aIZCL6/5ipus53DReThc1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d9a12c20fafa8f718530b4218c7509f
Files
-
5d9a12c20fafa8f718530b4218c7509f.exe windows:4 windows x86 arch:x86
0f997822e50b9fbeb1605b1a68f58be1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord15
ord43
ord44
ord45
ord32
ord16
ord21
ord18
ord22
ntdll
RtlCreateUnicodeString
RtlFreeUnicodeString
kernel32
ResetEvent
GetCurrentThreadId
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetVersion
GetFileAttributesW
GetProcAddress
WaitForSingleObject
SetEvent
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
GlobalSize
CreateEventW
DeleteCriticalSection
CloseHandle
InterlockedExchange
InterlockedCompareExchange
QueryPerformanceCounter
GlobalAlloc
GlobalFree
FlushInstructionCache
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetTickCount
GlobalUnlock
GlobalLock
Sleep
LocalFree
LocalAlloc
MultiByteToWideChar
FindClose
FindFirstFileW
FormatMessageW
CompareStringW
GetCommandLineW
GetFullPathNameW
ExpandEnvironmentStringsW
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryA
VirtualAlloc
CreateActCtxW
ReleaseActCtx
ActivateActCtx
DeactivateActCtx
VirtualFree
oleaut32
SysStringLen
SysAllocString
SafeArrayGetVartype
VariantClear
VariantInit
VariantChangeType
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SysFreeString
SafeArrayGetDim
ole32
CoInitialize
CoUninitialize
ReleaseStgMedium
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
StringFromGUID2
shlwapi
PathFindFileNameW
PathAddBackslashW
PathRemoveFileSpecW
PathStripPathW
secur32
TranslateNameW
ntdsapi
DsCrackNamesW
DsFreeNameResultW
activeds
ord13
ord9
Sections
.text Size: 66KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cbss Size: - Virtual size: 168KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ctls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msshare Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mstp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ