Static task
static1
Behavioral task
behavioral1
Sample
51a3117c3e936cb978250af4879ef96c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51a3117c3e936cb978250af4879ef96c.exe
Resource
win10v2004-20231215-en
General
-
Target
51a3117c3e936cb978250af4879ef96c
-
Size
1.2MB
-
MD5
51a3117c3e936cb978250af4879ef96c
-
SHA1
fd0ce1e51cd2f4376278d05c59d2c7aebc04bc27
-
SHA256
5c7579be1abe222974c55d91201a0f9600fadc1c7615233ba6c23f7daa2d19de
-
SHA512
b898ae2998b0fa40446892565f97ee68ac3f5e2938761132ee7891a6dd0ee3130911154b45ebce95a44d39ccdd77f241ca34170edaf823cfc6a746f172e4b4df
-
SSDEEP
24576:f1z1iEig9rs4btvF72U+K4ObrS/3q+mnuKyqcBrdxCHOV3pVz677:lMg9HBd2Kjry3qKKy7B5xCuvVWv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51a3117c3e936cb978250af4879ef96c
Files
-
51a3117c3e936cb978250af4879ef96c.exe windows:4 windows x86 arch:x86
7989bf05d8c3c409d56cf7d298f96ed7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
lstrcpyA
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
GetLastError
lstrcatA
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
DosDateTimeToFileTime
lstrcmpA
CreateDirectoryA
GetDriveTypeA
WriteFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
LockResource
LoadResource
FindResourceA
SetFilePointer
ReadFile
Sleep
lstrlenA
lstrcmpiA
GetFileSize
RaiseException
GetFileAttributesA
HeapSize
HeapReAlloc
GetStringTypeA
SetEnvironmentVariableA
CompareStringW
GetProcAddress
IsBadCodePtr
IsBadWritePtr
CompareStringA
GetOEMCP
GetACP
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCPInfo
GetStringTypeW
GetDiskFreeSpaceA
RtlUnwind
GetModuleHandleA
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetEnvironmentStrings
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetStdHandle
MultiByteToWideChar
SetHandleCount
GetCurrentProcess
GetStdHandle
ExitProcess
SetEndOfFile
VirtualAlloc
HeapAlloc
HeapFree
GetFileType
TerminateProcess
HeapCreate
VirtualFree
GetCommandLineA
GetVersion
HeapDestroy
user32
GetWindowLongA
GetMessageTime
PeekMessageA
EndDialog
DispatchMessageA
TranslateMessage
SetWindowLongA
SetDlgItemTextA
DialogBoxParamA
CreateDialogParamA
GetDesktopWindow
SetWindowTextA
SetFocus
DestroyWindow
GetDlgItemTextA
GetMessagePos
MessageBoxA
EnableWindow
SetTimer
KillTimer
MessageBeep
GetParent
PostMessageA
LoadStringA
GetWindowTextA
SendMessageA
GetDlgItem
wsprintfA
SendDlgItemMessageA
GetClientRect
CreateWindowExA
comctl32
ord17
PropertySheetA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ