Static task
static1
Behavioral task
behavioral1
Sample
5569a901f7c0f591ef50bb8c0de86f97.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5569a901f7c0f591ef50bb8c0de86f97.exe
Resource
win10v2004-20231215-en
General
-
Target
5569a901f7c0f591ef50bb8c0de86f97
-
Size
576KB
-
MD5
5569a901f7c0f591ef50bb8c0de86f97
-
SHA1
fb855c083705a3ae585b3e169a35ff5a4cc0f622
-
SHA256
7bafed296de5aea963a7916130637e9fc5139eb33895ce5c45385ac9e9172b2e
-
SHA512
e52f5b56f361f6281a1ecbdb19cdc842682247938d6f7a8ca570e8d27eab907e5e5a8704a571688440d96da5a76d97068232017252c12f941d60280a1b8ea337
-
SSDEEP
12288:ZOVfqFQPXp+LTsX/dIPvSsg6ynoBAY95GEVZ5UDlq+tL9:IVfqqp+LTsXVAwoBASwEVA55
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5569a901f7c0f591ef50bb8c0de86f97
Files
-
5569a901f7c0f591ef50bb8c0de86f97.exe windows:4 windows x86 arch:x86
706a6d956fa1f1211726250338544efa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
LoadAlterBitmap
ChooseFontW
comctl32
ImageList_AddIcon
CreateStatusWindowW
CreateToolbar
ImageList_GetImageCount
InitCommonControlsEx
ImageList_GetFlags
MakeDragList
ImageList_Destroy
_TrackMouseEvent
gdi32
GetPath
LineTo
GetStretchBltMode
Polyline
TextOutA
GetDeviceCaps
SetPaletteEntries
DPtoLP
SetStretchBltMode
CreateDCW
GetObjectA
FixBrushOrgEx
DeleteDC
StretchBlt
user32
SetWindowTextW
GetMenuItemID
SetClipboardData
DefWindowProcW
LoadAcceleratorsW
GetProcessDefaultLayout
TranslateMessage
UnregisterHotKey
RegisterClassA
GetUserObjectInformationA
CreateWindowExW
CreateWindowStationW
GetKeyboardLayout
GetCursor
MessageBeep
EnumDisplayDevicesA
RemoveMenu
GetClipboardFormatNameA
GetInputDesktop
GetMenuCheckMarkDimensions
FlashWindowEx
IsCharAlphaW
GetWindow
CascadeChildWindows
ScrollDC
UnhookWinEvent
DialogBoxIndirectParamW
UnregisterClassW
GetClassNameA
WindowFromPoint
DdeCmpStringHandles
EditWndProc
BringWindowToTop
MessageBoxA
GetClassInfoA
SetDeskWallpaper
GetShellWindow
TabbedTextOutW
DestroyWindow
GetDlgItemTextW
ShowOwnedPopups
GetWindowDC
DestroyIcon
RegisterClassExA
ShowWindow
SetDlgItemInt
DeferWindowPos
SendMessageTimeoutW
LoadCursorFromFileA
GetPropA
RegisterClassW
DialogBoxIndirectParamA
PeekMessageW
DrawFrame
MapDialogRect
ToAscii
CreatePopupMenu
shell32
RealShellExecuteExA
kernel32
FreeEnvironmentStringsW
IsBadWritePtr
HeapFree
lstrcmp
OpenMutexA
HeapSize
GetStartupInfoA
SuspendThread
VirtualAlloc
GetLastError
EnterCriticalSection
IsValidCodePage
CloseHandle
InitializeCriticalSection
TlsFree
GetTickCount
VirtualQuery
GetVersionExA
TlsSetValue
SetConsoleTextAttribute
GetEnvironmentStrings
GetModuleFileNameA
GetStringTypeW
CreateMutexA
TerminateProcess
GetModuleHandleA
LCMapStringW
GetCurrentThread
GetEnvironmentStringsW
SetEnvironmentVariableA
ReadFile
MultiByteToWideChar
GetFileType
LeaveCriticalSection
LCMapStringA
GetLocaleInfoA
IsValidLocale
GetStdHandle
SetThreadContext
CompareStringW
GetACP
GetStringTypeA
HeapCreate
GetLocaleInfoW
SetStdHandle
HeapReAlloc
GetSystemInfo
FreeEnvironmentStringsA
InterlockedExchange
WriteFile
DeleteCriticalSection
TlsGetValue
GetUserDefaultLCID
CompareStringA
QueryPerformanceCounter
HeapAlloc
CreateSemaphoreW
WideCharToMultiByte
GetModuleHandleW
LoadLibraryA
SetLastError
GetTimeZoneInformation
CreateDirectoryW
VirtualProtect
GetCurrentProcess
GetDateFormatA
SetFilePointer
GetTimeFormatA
GetCommandLineA
SetHandleCount
GetOEMCP
UnhandledExceptionFilter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCPInfo
EnumSystemLocalesA
HeapDestroy
lstrcmpW
RtlUnwind
ExitProcess
CreateThread
TlsAlloc
GetCurrentProcessId
FlushFileBuffers
VirtualFree
GetProcAddress
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ