Static task
static1
Behavioral task
behavioral1
Sample
57b5d7beaae1a25a4e54d383ed14014a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57b5d7beaae1a25a4e54d383ed14014a.exe
Resource
win10v2004-20231215-en
General
-
Target
57b5d7beaae1a25a4e54d383ed14014a
-
Size
328KB
-
MD5
57b5d7beaae1a25a4e54d383ed14014a
-
SHA1
7e4356537d271e2e8f661ef379fc56cec07e0ba3
-
SHA256
cc9c6f58f06b692a27c9268b34ffef9bdf70919f26e69bce3f9fd086f78c3c6c
-
SHA512
085fd6c606ee3a9a81d557b98a2f1da8135ca31acb8dab1eccd293532157d98a2c74c9922502d5603f6e735a9899bb1ccfc9bbf90d5c501906244cbcff8b4531
-
SSDEEP
6144:786R6AUunWmdZIFkJHumy/3Qt00GgCHHdOdtIKhp8U:7FRLDnW5kJ8/38/TudwtIKhp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57b5d7beaae1a25a4e54d383ed14014a
Files
-
57b5d7beaae1a25a4e54d383ed14014a.exe windows:4 windows x86 arch:x86
ca2da5f0b4eefb261ae1187b4dbe790b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleDC
GetDeviceCaps
SelectObject
kernel32
GetVersion
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
GetModuleHandleA
TlsFree
CompareStringA
RaiseException
GetCurrentThread
GetCommandLineA
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetCurrentProcessId
SizeofResource
VirtualFree
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
lstrlenA
GetSystemInfo
UnmapViewOfFile
SetStdHandle
GetLastError
InterlockedIncrement
ExitProcess
TlsSetValue
GetFileType
CreateFileW
CreateProcessA
GetProcAddress
DuplicateHandle
FindNextFileA
ResetEvent
GlobalFree
FindFirstFileA
FreeEnvironmentStringsW
CompareStringW
GetProcessHeap
GlobalLock
SetEvent
DeleteFileA
CreateDirectoryA
LCMapStringW
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetOEMCP
LoadLibraryW
SetHandleCount
EnterCriticalSection
GetEnvironmentStrings
WriteConsoleW
LeaveCriticalSection
GetCurrentThreadId
SetEndOfFile
GetConsoleMode
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
CreateMutexA
MultiByteToWideChar
LoadLibraryExW
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
InterlockedDecrement
SetLastError
OutputDebugStringA
FormatMessageA
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
LocalFree
FreeLibrary
SetFileAttributesA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
GetCPInfo
SetErrorMode
CreateFileA
ExpandEnvironmentStringsA
LocalAlloc
GetLocaleInfoA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetLocalTime
GetFileAttributesW
HeapDestroy
FindFirstFileW
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
GetConsoleOutputCP
GetStdHandle
GetUserDefaultLangID
GetSystemDefaultLCID
GetUserDefaultLCID
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
FindResourceA
VirtualAlloc
HeapFree
advapi32
GetTokenInformation
OpenProcessToken
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
user32
SetWindowLongA
SetCapture
GetWindowRect
GetSystemMetrics
DefWindowProcA
PeekMessageA
SetFocus
EndPaint
FillRect
SetTimer
GetSubMenu
RegisterClassA
EnableMenuItem
TranslateMessage
SetWindowPos
EndDialog
ShowWindow
UpdateWindow
GetParent
DestroyWindow
GetClientRect
ReleaseDC
GetCursorPos
GetDC
PostMessageA
DispatchMessageA
IsWindow
PostQuitMessage
DestroyMenu
ClientToScreen
SetWindowTextA
wsprintfA
CreateWindowExA
GetDlgItem
ScreenToClient
LoadCursorA
GetDesktopWindow
SetForegroundWindow
GetFocus
MessageBoxA
GetSysColor
IsWindowVisible
InvalidateRect
SendMessageA
DrawTextA
EnableWindow
SetCursor
msvcrt
_strcmpi
_onexit
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 312KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ