Static task
static1
Behavioral task
behavioral1
Sample
50797746b44cbb7a9660b0ecb831997a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50797746b44cbb7a9660b0ecb831997a.exe
Resource
win10v2004-20231222-en
General
-
Target
50797746b44cbb7a9660b0ecb831997a
-
Size
848KB
-
MD5
50797746b44cbb7a9660b0ecb831997a
-
SHA1
91eac626da602326b5ea906a3b443bb3339e838c
-
SHA256
58ba2d82589248fce5846bf721703e04deb59e85b270b4b89a9037c8021a1cc2
-
SHA512
6e014198e2437afe1f3f6ae71179ed2b237db80ed589c1b80bc066ac62f95e6afbd768f7d59d031a9bd776c55a25792af895288d43a2e089e203a7b5ee8c07f5
-
SSDEEP
24576:Tb3WXl1GbRVrBqUr+FtFaIWkq0NTaKtp6H5NSTy:T6Xl1GbRTP+DNWr0NTaGEWy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50797746b44cbb7a9660b0ecb831997a
Files
-
50797746b44cbb7a9660b0ecb831997a.exe windows:5 windows x86 arch:x86
10452b25ef2ff988e143a41a3cf9cb8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
InterlockedDecrement
InterlockedExchange
CloseHandle
GlobalAlloc
FindClose
GlobalUnlock
GetSystemDirectoryA
GetModuleFileNameA
lstrlenA
GetFileSize
GlobalFree
LeaveCriticalSection
FreeLibrary
GetCurrentProcess
FlushInstructionCache
SetErrorMode
lstrcmpiA
ExitProcess
HeapAlloc
HeapCreate
LoadLibraryA
GetModuleHandleA
GetLastError
InterlockedIncrement
WaitForSingleObject
WriteFile
ReleaseMutex
GetSystemTime
SetLastError
GetSystemDefaultLangID
InitializeCriticalSection
DebugBreak
GetExitCodeProcess
GetLogicalDrives
CreateThread
GetStdHandle
GetCurrentThreadId
DeleteCriticalSection
LocalFree
ReadFile
HeapDestroy
DeviceIoControl
SystemTimeToFileTime
GlobalLock
GetWindowsDirectoryA
EnterCriticalSection
CompareStringA
user32
GetSystemMenu
TranslateMessage
GetActiveWindow
ShowWindow
GetCapture
SetForegroundWindow
DestroyWindow
GetWindow
IsWindow
ClipCursor
SetRectEmpty
KillTimer
SetTimer
GetSystemMetrics
SetCapture
GetWindowRect
SetFocus
SetWindowRgn
DeleteMenu
MsgWaitForMultipleObjects
ReleaseCapture
PostQuitMessage
MapWindowPoints
ReleaseDC
GetParent
SetRect
UnhookWindowsHookEx
FlashWindow
MonitorFromPoint
GetClientRect
GetDC
IsZoomed
EndDialog
SetWindowPos
CallNextHookEx
gdi32
OffsetRgn
GetDeviceCaps
DeleteObject
CreateRectRgnIndirect
CreateRectRgn
GetRgnBox
CombineRgn
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegOpenCurrentUser
shell32
ord4
SHGetMalloc
ord2
SHGetSpecialFolderLocation
ole32
CoUninitialize
OleUninitialize
OleInitialize
oleaut32
SysFreeString
SysStringLen
SysAllocString
VariantClear
comctl32
ord17
InitCommonControlsEx
winmm
timeGetTime
waveOutGetNumDevs
wininet
InternetAttemptConnect
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
InternetAutodial
InternetConnectW
InternetOpenW
InternetCloseHandle
setupapi
CM_Get_Device_IDW
SetupDiDestroyDeviceInfoList
CM_Get_Parent
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
secur32
DeleteSecurityContext
msvcrt
calloc
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textes Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 299KB - Virtual size: 299KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 203KB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.catow Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ