Static task
static1
Behavioral task
behavioral1
Sample
5ffe33d94750a38613dcbf053a7601b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ffe33d94750a38613dcbf053a7601b9.exe
Resource
win10v2004-20231215-en
General
-
Target
5ffe33d94750a38613dcbf053a7601b9
-
Size
100KB
-
MD5
5ffe33d94750a38613dcbf053a7601b9
-
SHA1
21f1fbf0705fb2a1e8fd4263426210feaf468a9c
-
SHA256
c6114b48ad7811b9ae717d2248889e0da77e4743cc2c6e7febd0469f46cb5d83
-
SHA512
3b94982b8b86f0d7eff88cd099bb1001afad43d13be7454df5cbf7bfcb29aefcd2f6eab3f0078995650966afba3ec949b929b39482a79ea32cdb0eda92faa2ad
-
SSDEEP
3072:Wg5qO5/oPeu37EgnA0oe+JQzBvD7Vly8:AO5/oPeurVgnQtvD7S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ffe33d94750a38613dcbf053a7601b9
Files
-
5ffe33d94750a38613dcbf053a7601b9.exe windows:4 windows x86 arch:x86
c7eec803b7763e5dba6eb006dd4766f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
PathFileExistsA
ws2_32
setsockopt
kernel32
GetLocaleInfoA
GetTickCount
InitializeCriticalSection
WideCharToMultiByte
lstrcatA
GetACP
MultiByteToWideChar
lstrlenW
RaiseException
InterlockedExchange
GetLastError
GetThreadLocale
GetProcAddress
LoadLibraryA
GetModuleFileNameA
DeleteCriticalSection
GetVersionExA
CloseHandle
lstrcpyA
GetStdHandle
GetVersion
GetCurrentProcessId
GetVolumeInformationA
SetFileAttributesA
DeleteFileA
lstrlenA
CreateFileA
GetFileSize
ExpandEnvironmentStringsA
WriteFile
ReadFile
lstrcmpA
WaitForSingleObject
GetWindowsDirectoryA
CreateEventA
lstrcmpiA
ResetEvent
GetCurrentThreadId
GetTempPathA
TerminateThread
WinExec
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
LCMapStringA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
Sleep
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetCPInfo
GetOEMCP
SetStdHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
VirtualQuery
SetUnhandledExceptionFilter
user32
DestroyWindow
OpenIcon
GetGuiResources
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueA
RegOpenKeyExA
ole32
CoInitialize
CoCreateInstance
shell32
SHGetFolderPathA
CommandLineToArgvW
SHGetSpecialFolderPathA
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ