Static task
static1
Behavioral task
behavioral1
Sample
57620fe23fe46b9b50f5ec40bdc6b8fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57620fe23fe46b9b50f5ec40bdc6b8fa.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
57620fe23fe46b9b50f5ec40bdc6b8fa.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
57620fe23fe46b9b50f5ec40bdc6b8fa.exe
Resource
win11-20231215-en
General
-
Target
57620fe23fe46b9b50f5ec40bdc6b8fa.exe
-
Size
419KB
-
MD5
57620fe23fe46b9b50f5ec40bdc6b8fa
-
SHA1
fe38a4e6d66ad1cc621ea39e3d344d1fcd6227d2
-
SHA256
d1a299c8b89530ee091ceeb89c172bdd9317816825b68926b0e368714e74d27f
-
SHA512
671cd11456cc62533acfd62693db39488aa8964db4f4b4729ec1305b8b5550798bd1eae4107957eb5bc1b29d6023c8f28b0f33ccaf21a2b7169e5bf49125f1a3
-
SSDEEP
6144:1qH4z36C4T4+vJSMo6NH3IuMcWml++Em3aH5WO7qxCico7BEn8Zr1:1q5C64eGuMcWO+o3GzexCoyn85
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 57620fe23fe46b9b50f5ec40bdc6b8fa.exe
Files
-
57620fe23fe46b9b50f5ec40bdc6b8fa.exe.exe windows:5 windows x86 arch:x86
e35f8b1f81e9ff2dab196a397d763305
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeactivateActCtx
GetVersionExW
SetConsoleCP
GetConsoleAliasesLengthA
GetDefaultCommConfigA
FindFirstFileExW
GetDriveTypeA
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointW
GetLongPathNameW
CopyFileW
TlsGetValue
GetConsoleCursorInfo
SetComputerNameExW
SystemTimeToTzSpecificLocalTime
FindAtomA
ReleaseSemaphore
CallNamedPipeA
CreateMailslotW
BuildCommDCBAndTimeoutsA
VirtualProtect
LoadLibraryA
LocalAlloc
TryEnterCriticalSection
GetCommandLineW
InterlockedDecrement
GetCalendarInfoA
DeleteFileA
CreateActCtxW
CreateRemoteThread
SetSystemTimeAdjustment
SetPriorityClass
WritePrivateProfileStringW
GetProcessHeap
GlobalUnWire
ReadConsoleOutputCharacterW
GetStartupInfoW
GetDiskFreeSpaceExA
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryW
GetProfileStringW
WriteProfileSectionA
GetProfileStringA
GetLastError
DeleteVolumeMountPointA
DebugBreak
GetPrivateProfileSectionW
lstrcmpA
ReadFileScatter
SetConsoleMode
GetSystemWindowsDirectoryW
TerminateProcess
GlobalFindAtomA
FindCloseChangeNotification
GetTapeParameters
SetMailslotInfo
InterlockedExchange
DefineDosDeviceW
FindVolumeMountPointClose
EndUpdateResourceA
WriteConsoleA
GetSystemTimeAdjustment
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructA
GetFileAttributesExA
Process32NextW
MoveFileW
GetVolumePathNameA
HeapUnlock
lstrcmpW
GetExitCodeProcess
FindActCtxSectionGuid
ResetEvent
GetThreadContext
MoveFileExW
GlobalUnlock
UnregisterWaitEx
BuildCommDCBA
PeekConsoleInputW
GetBinaryTypeW
CreateSemaphoreW
TransmitCommChar
WaitNamedPipeA
GetOverlappedResult
GetPrivateProfileSectionNamesW
FindResourceExW
EnumTimeFormatsW
GetLocalTime
OpenSemaphoreA
GetProcAddress
SetFileShortNameA
lstrcpyW
VerLanguageNameW
SetThreadExecutionState
SetSystemTime
LockFile
VerSetConditionMask
GetConsoleAliasA
FlushConsoleInputBuffer
AllocConsole
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputW
TransactNamedPipe
EnumDateFormatsA
GetCommState
FileTimeToLocalFileTime
_lopen
GetConsoleAliasExesLengthW
GetWriteWatch
FreeEnvironmentStringsA
GetModuleHandleW
WriteConsoleOutputCharacterA
GetConsoleMode
HeapReAlloc
OpenMutexA
LocalLock
GetCommMask
SetEndOfFile
FindClose
SetFileApisToANSI
CancelWaitableTimer
GetProcessHandleCount
RegisterWaitForSingleObject
GetConsoleAliasesLengthW
GetCurrentProcessId
lstrcpynA
SetNamedPipeHandleState
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
DeleteAtom
GlobalAddAtomW
AssignProcessToJobObject
QueryDosDeviceW
InitializeCriticalSection
Process32FirstW
SetCurrentDirectoryA
GetBinaryTypeA
CreateIoCompletionPort
SetDefaultCommConfigA
TerminateThread
MoveFileA
RaiseException
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetModuleHandleA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapSize
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
OemToCharA
advapi32
GetFileSecurityW
Sections
.text Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kewese Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.laroy Size: 512B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lesipet Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ