Static task
static1
Behavioral task
behavioral1
Sample
556a6274832eb9ddc54a96f9102a057a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
556a6274832eb9ddc54a96f9102a057a.exe
Resource
win10v2004-20231215-en
General
-
Target
556a6274832eb9ddc54a96f9102a057a
-
Size
541KB
-
MD5
556a6274832eb9ddc54a96f9102a057a
-
SHA1
b4aecbc377ad8d45572fea0dba00ce5078b65bd4
-
SHA256
e7e8591771188e9201c39187fa5b688f1eabb3478693bf712f879b7f31c8f6b6
-
SHA512
32b7f2e9ac8beca374825a3021e0ad907da20192509cba13147ebb22de8f9393392b35a56e80509ae860b28188c0f93be09dbafde1b81929d9bafdacdbaf29e3
-
SSDEEP
12288:KWAsCoRQoPvVWk6f4/GLjJKLm+alvPeukNU8UT1LqS21xe52+2QxNQFD/fhEfImD:Nnmmfacs80J2j9O4DYZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 556a6274832eb9ddc54a96f9102a057a
Files
-
556a6274832eb9ddc54a96f9102a057a.exe windows:5 windows x86 arch:x86
0f60d7fa1afe421bceb1e84afd1374d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
ShellExecuteExW
SHGetFileInfoW
ShellExecuteW
CommandLineToArgvW
SHBrowseForFolderW
SHGetPathFromIDListW
kernel32
VirtualFree
WriteConsoleW
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
HeapFree
GetLastError
LoadLibraryW
HeapAlloc
GetProcAddress
GetProcessHeap
FreeLibrary
GetFileAttributesW
CloseHandle
GetCurrentProcess
GetVersionExW
GetModuleHandleW
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
SetFileApisToOEM
SetPriorityClass
SetThreadPriority
GetEnvironmentVariableW
GetCurrentThread
GetCommandLineW
FindFirstFileW
FindNextFileW
FindClose
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLongPathNameW
CreateFileW
GetCurrentThreadId
FindResourceW
GetCurrentProcessId
LoadLibraryExW
WriteFile
SetFileTime
SetEndOfFile
FormatMessageW
InterlockedExchangeAdd
ReadFile
SetFilePointer
VirtualAlloc
ResumeThread
GetACP
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
FileTimeToSystemTime
CreateEventW
SetEvent
ResetEvent
WaitForMultipleObjects
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
LCMapStringW
GetFileType
GetStringTypeW
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
GetFileSize
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
user32
ScreenToClient
DispatchMessageW
SetTimer
IsDialogMessageW
TranslateMessage
LoadIconW
KillTimer
PostQuitMessage
EnableWindow
DestroyIcon
IsWindow
IsWindowVisible
ShowWindow
PostMessageW
GetWindowRect
SetWindowPos
GetSystemMetrics
DialogBoxParamW
SendMessageW
EndDialog
SetWindowTextW
SetFocus
GetDlgItem
GetWindowTextW
CreateDialogParamW
GetMessageW
GetDesktopWindow
LoadStringW
MessageBoxW
gdi32
CreateSolidBrush
DeleteObject
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoInitialize
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ