Static task
static1
Behavioral task
behavioral1
Sample
51036912d47f7b4b8e68e365d678a079.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51036912d47f7b4b8e68e365d678a079.exe
Resource
win10v2004-20231222-en
General
-
Target
51036912d47f7b4b8e68e365d678a079
-
Size
421KB
-
MD5
51036912d47f7b4b8e68e365d678a079
-
SHA1
d6ecde09259645f889728e955b7e939ed047787a
-
SHA256
74a2bf3564850e49db05681224e60b717469a88923369b1d4a809a15774c8181
-
SHA512
31f0172427194f15181f29bc3460fa48204878ba82854f06ad16368280224843bd066626378e2b283f91cbb17681af15c3a71d353d3588291d383567520ba925
-
SSDEEP
6144:ruQ7lCPXC0/Apf8VIN4aSJpg5GmnApfz9OB1OqhS50sdiKRFH7+8:K0cPXZApfOIWampCGmnApZOBmiOh7H3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51036912d47f7b4b8e68e365d678a079
Files
-
51036912d47f7b4b8e68e365d678a079.exe windows:4 windows x86 arch:x86
c4c9c4bf0685ffc41c34300fdb2afc22
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Module32Next
Module32First
Process32Next
Process32First
GetModuleFileNameA
GetModuleHandleA
CreateToolhelp32Snapshot
lstrcpyA
lstrlenA
ResumeThread
lstrcmpA
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetProcAddress
LoadLibraryA
SetThreadContext
ExitProcess
RaiseException
RtlUnwind
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
CloseHandle
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ReadFile
SetFilePointer
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CreateFileA
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
advapi32
GetUserNameA
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ