Static task
static1
Behavioral task
behavioral1
Sample
50dc52643ce24149f63e2435a50c0e52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50dc52643ce24149f63e2435a50c0e52.exe
Resource
win10v2004-20231215-en
General
-
Target
50dc52643ce24149f63e2435a50c0e52
-
Size
1.5MB
-
MD5
50dc52643ce24149f63e2435a50c0e52
-
SHA1
f1c047b81493e784a68a896e9d265935ce3fe64e
-
SHA256
045d0fcf6dc04131c782602dbc1d66cdad358079476fc36b62271c437538e8b7
-
SHA512
7c458c11c701a55b98a24f54d1ecb8a627fe863fa74462bb0a545838ebb1e4857ed7750e8745af466a6bda18b617b11be3843f0cbb1f27b98ea4638e2a048785
-
SSDEEP
24576:9auefiRGbOmP/Is7ltn+XbhHaxJN7pSm3QRv7WGgsANdKqVpX9DuOC6:UussGFjlN2N0R3QRyNdKqVpX9k6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50dc52643ce24149f63e2435a50c0e52
Files
-
50dc52643ce24149f63e2435a50c0e52.exe windows:5 windows x86 arch:x86
8f91a91067f5306c855b6ce83bc9927d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetSystemDirectoryW
UnmapViewOfFile
GetVersionExW
GetDriveTypeW
SleepEx
GetStdHandle
GetFileType
GetCurrentThreadId
GetModuleHandleA
QueryPerformanceCounter
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
InterlockedDecrement
InterlockedIncrement
DuplicateHandle
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoW
InitializeCriticalSection
PeekNamedPipe
ExpandEnvironmentStringsA
FormatMessageA
SetConsoleCtrlHandler
SetEnvironmentVariableA
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
SetStdHandle
ReadConsoleW
FlushFileBuffers
GetConsoleCP
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetFileInformationByHandle
SetFilePointerEx
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
AreFileApisANSI
ExitProcess
IsProcessorFeaturePresent
GetTimeZoneInformation
LoadLibraryExW
ExitThread
CreateThread
GetSystemTimeAsFileTime
GetFullPathNameW
WriteConsoleW
SetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
ProcessIdToSessionId
GetStartupInfoW
LocalFree
TerminateProcess
OpenProcess
QueryDosDeviceW
GetCurrentDirectoryW
CreateProcessW
ResumeThread
LoadLibraryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
GetProcAddress
FindResourceExW
GetTickCount
ExpandEnvironmentStringsW
SetEndOfFile
GetPrivateProfileStringW
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
ReadFile
GetTempPathW
DecodePointer
GetFileSize
FindClose
SetFileAttributesW
DeleteFileW
MoveFileExW
SizeofResource
LockResource
LoadResource
FindResourceW
WriteFile
CreateFileW
CreateDirectoryW
lstrcpynW
GetFileAttributesW
GetModuleFileNameW
CreateEventW
WaitForSingleObject
ResetEvent
SetEvent
InterlockedCompareExchange
InterlockedExchange
SetDllDirectoryW
GetCommandLineW
GetModuleHandleW
CreateMutexW
CloseHandle
Sleep
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
GetModuleHandleExW
GetStringTypeW
EncodePointer
OutputDebugStringW
IsDebuggerPresent
GetCurrentProcessId
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
user32
PostMessageW
CallWindowProcW
SendMessageTimeoutW
FindWindowA
CreateWindowExW
IsWindow
DestroyWindow
GetWindowLongW
SetWindowLongW
FindWindowW
CreateDesktopW
GetMessageW
TranslateMessage
DispatchMessageW
SetTimer
KillTimer
DefWindowProcW
PeekMessageW
GetWindowThreadProcessId
MessageBoxA
SendMessageW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
QueryServiceStatusEx
DeleteService
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
ChangeServiceConfig2W
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
shlwapi
PathFileExistsW
StrCmpNIW
PathRemoveFileSpecW
PathAppendW
PathAddBackslashW
StrToIntExW
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
iphlpapi
GetAdaptersInfo
wininet
HttpOpenRequestW
HttpQueryInfoW
HttpAddRequestHeadersW
InternetSetStatusCallbackW
InternetCloseHandle
HttpSendRequestW
InternetReadFileExA
InternetOpenW
InternetCrackUrlW
InternetConnectW
wldap32
ord167
ord208
ord145
ord147
ord79
ord26
ord41
ord127
ord118
ord27
ord301
ord46
ord142
ord133
ord14
ord216
ntdll
RtlUnwind
ws2_32
freeaddrinfo
getaddrinfo
listen
accept
__WSAFDIsSet
WSAIoctl
gethostname
getpeername
getsockname
bind
connect
WSAGetLastError
ntohs
recvfrom
sendto
htons
WSASetLastError
select
WSAStartup
setsockopt
ioctlsocket
recv
send
WSACleanup
closesocket
socket
getsockopt
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 334KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ