Static task
static1
Behavioral task
behavioral1
Sample
5389691c4b6a9966fc823cc705d8c3de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5389691c4b6a9966fc823cc705d8c3de.exe
Resource
win10v2004-20231215-en
General
-
Target
5389691c4b6a9966fc823cc705d8c3de
-
Size
59KB
-
MD5
5389691c4b6a9966fc823cc705d8c3de
-
SHA1
9f2de5b1a09066b1befdbccb049ea3a5e6c525f9
-
SHA256
40f6fb82ccddc3a1bc4641d04e55bdb9f093f2d4b98367b679eadb2a527931c0
-
SHA512
97b2929cfdca5185ba7af1e51a3dfa19672d7fa974af3ac7c9361dec14073c5141f56018fba1cf9c254778615e525882e168e84771cecc02920f920167527ab1
-
SSDEEP
1536:OKub0zq+5hRpfvL7Iv7JxArF4g0qpdqdPhV95wKY3Of9YuAoMbxd2Q:OJXv7nSr0ydEzwKQy9Cbu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5389691c4b6a9966fc823cc705d8c3de
Files
-
5389691c4b6a9966fc823cc705d8c3de.exe windows:4 windows x86 arch:x86
a2566ea5c69541b04ef177b522cb9826
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncpy
fabs
ceil
malloc
floor
free
memcpy
_CIsqrt
_CIlog
_CIpow
fseek
ftell
fread
fclose
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
TlsAlloc
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
HeapAlloc
HeapFree
HeapReAlloc
GetLogicalDriveStringsA
user32
DestroyIcon
FillRect
gdi32
GetDeviceCaps
GetObjectType
DeleteObject
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
GetStockObject
winmm
mciSendCommandA
Sections
.code Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ta Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
src Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ