Static task
static1
Behavioral task
behavioral1
Sample
56c5810d5886dd0616a4006229368fb7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56c5810d5886dd0616a4006229368fb7.exe
Resource
win10v2004-20231215-en
General
-
Target
56c5810d5886dd0616a4006229368fb7
-
Size
108KB
-
MD5
56c5810d5886dd0616a4006229368fb7
-
SHA1
703840d29cc67dc6bc445bc08220acb153ae3495
-
SHA256
47a0f1bd0ef33fcae61f59ba73abe6cb7bbd8fea040cc3eb1391f1909654206d
-
SHA512
9858e4f7be7465a633d17ffd6eae98fc4ca8a559e9e17e1a2c1cf33a29c43a9a513c62e08a321a9222db3489b3e5330163eaf7753ecb26fe6ba2e8a8384b3b03
-
SSDEEP
1536:ryk/CisLxJaJ7vNHOxkDyRwnGCPgFMBHZfoYfaRI:2iRZNxnNcoHZfowaRI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56c5810d5886dd0616a4006229368fb7
Files
-
56c5810d5886dd0616a4006229368fb7.exe windows:4 windows x86 arch:x86
70729ca99a96a938622a91e46303ac53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetLastError
SetLastError
GetCurrentProcessId
OpenProcess
LoadLibraryA
GetProcAddress
GetModuleHandleA
CloseHandle
HeapAlloc
Process32First
CreateToolhelp32Snapshot
GetCurrentDirectoryA
GetComputerNameA
GetOEMCP
GetACP
GetCPInfo
GetCurrentThread
CreateThread
GetTickCount
MultiByteToWideChar
GetSystemDefaultLangID
GetModuleFileNameA
SetErrorMode
GetCurrentProcess
Process32Next
GetCurrentThreadId
CreateFileA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
RtlUnwind
Sleep
GetCommandLineA
GetVersion
ExitProcess
RaiseException
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetEndOfFile
user32
GetParent
GetForegroundWindow
GetWindowLongA
gdi32
GetCurrentObject
advapi32
DuplicateTokenEx
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceA
ControlService
CloseServiceHandle
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
GetErrorInfo
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 994KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ