Static task
static1
Behavioral task
behavioral1
Sample
50984a18a9ace86447a57ada69823638.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
50984a18a9ace86447a57ada69823638.exe
Resource
win10v2004-20231215-en
General
-
Target
50984a18a9ace86447a57ada69823638
-
Size
464KB
-
MD5
50984a18a9ace86447a57ada69823638
-
SHA1
95a1db23694061401360cc70d72a4bebcf65a362
-
SHA256
9a4080ae748901d3208c0df56c277b6b425ba83e614cff42394cf6e01b610861
-
SHA512
86731af0ff6c184de771294962ca42dcdcb276d13b674ef78ff84569aa5cc5f1c35af7051010b8de6abe91d64d0c67a31216722a44d24a969207fb6387442cba
-
SSDEEP
12288:kwt62ghZvGHGndMGxWaF3qW7noZcb4K34:gyGXtRbr3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50984a18a9ace86447a57ada69823638
Files
-
50984a18a9ace86447a57ada69823638.exe windows:4 windows x86 arch:x86
047081a7620f81f00ea5daf0780b7232
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadCodePtr
GetProcAddress
EnterCriticalSection
GetModuleHandleA
VirtualAlloc
OpenSemaphoreA
HeapCreate
GetPriorityClass
Sleep
DeleteCriticalSection
GetTickCount
GetLastError
VirtualProtectEx
ResetEvent
GetModuleFileNameA
ReleaseSemaphore
ExitProcess
GetCurrentProcessId
TlsFree
CreateEventA
LocalReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
GetSystemTimeAsFileTime
QueryPerformanceCounter
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
HeapReAlloc
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
LCMapStringA
MultiByteToWideChar
user32
LoadAcceleratorsA
IsChild
GetDesktopWindow
SendMessageA
GetLastActivePopup
PostMessageA
GetDC
gdiplus
GdipAlloc
GdipDeleteBrush
GdipCreateSolidFill
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipCloneBrush
winmm
auxSetVolume
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 248KB - Virtual size: 759KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ