Static task
static1
Behavioral task
behavioral1
Sample
5da7b5a6d79339bb86ba48ed019b947e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5da7b5a6d79339bb86ba48ed019b947e.exe
Resource
win10v2004-20231215-en
General
-
Target
5da7b5a6d79339bb86ba48ed019b947e
-
Size
52KB
-
MD5
5da7b5a6d79339bb86ba48ed019b947e
-
SHA1
60a21e7e72b414578f67cd35147e6711fa0e2b26
-
SHA256
c0f35e299a01580aaf99f6210962689e8aa7b72a90eb1de3cf5ea787abeb8284
-
SHA512
800eec77e7b298999580eb0c73ede4c4a0e01cfed551c4533dd9e0dc477ff3e5628a0ebad02a3575b39d24b0cbc509d2701a56befe1e763fa925b721905c8cb7
-
SSDEEP
1536:8d73zrKfH7uzgsEO6VtnpPOTjoGxOvoHh2RVx:XX1bVJpPOTjoGxOgHh2R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5da7b5a6d79339bb86ba48ed019b947e
Files
-
5da7b5a6d79339bb86ba48ed019b947e.exe windows:4 windows x86 arch:x86
dc4498da16745b36b521879ba330072b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorW
InsertMenuW
GetWindowTextW
SendDlgItemMessageA
GetCursor
GetMessageW
DeleteMenu
SetCursor
MsgWaitForMultipleObjects
KillTimer
SetTimer
WinHelpW
SetWindowLongW
GetThreadDesktop
MapWindowPoints
ShowWindowAsync
RegisterClassExA
IsDlgButtonChecked
LoadStringA
ReleaseDC
LoadImageW
DialogBoxParamW
PostQuitMessage
CharPrevW
PostMessageW
wsprintfW
SetFocus
CreateWindowExW
GetWindowTextA
RegisterWindowMessageW
EndDialog
CharNextW
GetWindowLongW
MoveWindow
GetDC
DispatchMessageW
TranslateMessage
SetForegroundWindow
PeekMessageW
GetDlgCtrlID
SetDlgItemTextA
ChildWindowFromPointEx
BeginPaint
GetWindowTextLengthW
RegisterClassExW
ShowCursor
SetActiveWindow
LoadIconW
wvsprintfW
GetFocus
SendMessageA
GetDlgItem
SetDlgItemInt
CallWindowProcW
GetWindowThreadProcessId
GetClientRect
EnumWindows
CheckDlgButton
SetDlgItemTextW
CreateDialogParamW
EnableMenuItem
GetWindowRect
DestroyWindow
CharUpperW
MessageBoxW
GetClassLongW
FindWindowExW
GetParent
IsWindowEnabled
ChildWindowFromPoint
PostThreadMessageW
GetClassInfoExA
DefWindowProcW
InvalidateRect
SystemParametersInfoA
EndPaint
LoadStringW
UnregisterClassW
UpdateWindow
SetWindowPos
EnableWindow
ScreenToClient
IsWindowVisible
SendMessageW
MessageBoxExW
ShowWindow
GetDlgItemTextW
GetUserObjectInformationW
GetSystemMenu
ExitWindowsEx
IsWindow
LoadMenuW
SetWindowTextW
CharLowerW
SendDlgItemMessageW
GetDlgItemInt
wsprintfA
IsDialogMessageW
ntdll
RtlUnwind
cmpbk32
PhoneBookFreeFilter
PhoneBookGetRegionNameA
PhoneBookGetPhoneDUNA
PhoneBookGetPhoneCanonicalA
PhoneBookCopyFilter
PhoneBookHasPhoneType
PhoneBookGetCurrentCountryId
PhoneBookLoad
PhoneBookGetPhoneNonCanonicalA
PhoneBookEnumCountries
PhoneBookParseInfoA
PhoneBookGetCountryId
PhoneBookEnumNumbersWithRegionsZero
PhoneBookGetCountryNameW
PhoneBookGetPhoneType
PhoneBookGetPhoneDispA
PhoneBookMatchFilter
PhoneBookGetPhoneDescA
PhoneBookGetCountryNameA
PhoneBookUnload
PhoneBookEnumNumbers
PhoneBookEnumRegions
crypt32
CryptMsgClose
CryptFormatObject
kernel32
WaitForSingleObject
GetPrivateProfileStringW
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
GetCurrentProcessId
GetTempPathW
GetPrivateProfileStringA
GetSystemTime
LoadLibraryExA
GetCurrentProcess
GlobalReAlloc
GetModuleFileNameW
SystemTimeToFileTime
GetCurrentThreadId
GetStringTypeExW
VirtualQuery
LoadLibraryA
CreateDirectoryW
CreateEventW
GetProcessHeap
GetWindowsDirectoryA
FormatMessageW
HeapFree
OpenProcess
GetOEMCP
FindClose
WritePrivateProfileStringA
OutputDebugStringW
TlsAlloc
HeapCreate
SetStdHandle
FlushFileBuffers
GetACP
ExitProcess
InterlockedIncrement
LCMapStringA
GetStringTypeA
GetLastError
GlobalHandle
DeleteCriticalSection
CloseHandle
FreeConsole
GetStartupInfoA
WideCharToMultiByte
GlobalSize
OpenEventW
EnterCriticalSection
GetFileTime
SetEvent
lstrlenW
GetCurrentDirectoryW
GetEnvironmentStringsW
GetStdHandle
MapViewOfFile
FindNextFileW
UnhandledExceptionFilter
VirtualAlloc
UnmapViewOfFile
HeapReAlloc
LeaveCriticalSection
GetVersionExW
CompareFileTime
SetCurrentDirectoryW
GetFileAttributesW
IsBadReadPtr
HeapDestroy
FreeEnvironmentStringsA
lstrlenA
Beep
CreateMutexW
MulDiv
lstrcmpA
lstrcpynW
DuplicateHandle
CreateThread
GetTimeFormatW
GetFileType
SetHandleCount
GetPrivateProfileSectionW
CreateFileW
SetFileTime
SetFileAttributesW
MultiByteToWideChar
GetSystemTimeAsFileTime
LocalFree
lstrcpyA
LoadLibraryW
lstrcpynA
GetFileAttributesA
CreateProcessA
GetStringTypeW
CreateFileMappingW
FindFirstFileW
VirtualFree
GlobalAlloc
ReleaseMutex
GetEnvironmentStrings
GetTickCount
OpenFileMappingW
WriteFile
InterlockedDecrement
GetVersionExA
HeapAlloc
TlsFree
CreateProcessW
GlobalLock
lstrcmpiW
GetModuleHandleA
lstrcatA
GlobalUnlock
GetProcAddress
GetPrivateProfileIntW
WritePrivateProfileStringW
LocalAlloc
GetTempFileNameW
TerminateProcess
InterlockedExchange
LoadLibraryExW
SetLastError
GetSystemInfo
SetFilePointer
QueryPerformanceCounter
GetSystemDirectoryW
InitializeCriticalSection
lstrcmpW
TlsSetValue
FreeEnvironmentStringsW
GetModuleHandleW
GetCurrentThread
GlobalFree
CompareStringW
SearchPathW
GetCPInfo
DeleteFileW
VirtualProtect
TlsGetValue
GetVolumeInformationA
GetModuleFileNameA
lstrcpyW
FindResourceExW
GetCommandLineA
FreeLibrary
LCMapStringW
lstrcatW
Sleep
GetLocaleInfoA
ExpandEnvironmentStringsW
CopyFileW
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
shell32
SHFileOperationW
activeds
DllGetClassObject
advapi32
GetUserNameW
RegCreateKeyExA
RegEnumKeyExW
AdjustTokenPrivileges
AddAccessAllowedAce
OpenProcessToken
InitializeAcl
SetSecurityDescriptorDacl
CreateProcessAsUserW
RegQueryValueExW
GetLengthSid
RegOpenKeyExA
RegDeleteKeyW
RegCloseKey
RegSetValueExA
AllocateAndInitializeSid
RegSetValueExW
LookupPrivilegeValueW
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
InitializeSecurityDescriptor
FreeSid
OpenThreadToken
RegQueryValueExA
gdi32
SelectPalette
StretchBlt
GetObjectA
DeleteDC
CreatePalette
GetDeviceCaps
GetStockObject
RealizePalette
DeleteObject
CreateCompatibleDC
GetDIBits
UnrealizeObject
CreateDIBitmap
SelectObject
SetStretchBltMode
Sections
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE