Static task
static1
Behavioral task
behavioral1
Sample
58dc0440cd772c9bda7f1621e28169fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58dc0440cd772c9bda7f1621e28169fe.exe
Resource
win10v2004-20231215-en
General
-
Target
58dc0440cd772c9bda7f1621e28169fe
-
Size
560KB
-
MD5
58dc0440cd772c9bda7f1621e28169fe
-
SHA1
2fd88cc3d0bc3b458b079aa29e86b84573c48c68
-
SHA256
3d992d2dcf0bdca222b48f4f59bf2c649fee6182ab4cea1877cf239fb0cf427f
-
SHA512
ed21656ff90b28cae725a4574220c2afc525990742b2636feb50eb453aa9db56e096d56f7f7dc6aa4bc3fdf69c228d2ace9fbfb5428137559bc015e7a514c8a9
-
SSDEEP
3072:2kjk83zzd13zzd49iiCMW1hwhDVdU/7UPgrPsje0O0Vjwd458TSP7M3kzf9:2+rzTzSNgkE7UPgrP8xK9TSY0zf9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58dc0440cd772c9bda7f1621e28169fe
Files
-
58dc0440cd772c9bda7f1621e28169fe.exe windows:0 windows x86 arch:x86
2c351a01263c1e2a785627e6a6300658
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
BaseCleanupAppcompatCacheSupport
ChangeTimerQueueTimer
CmdBatNotification
CommConfigDialogW
CompareStringA
ConvertDefaultLocale
ConvertThreadToFiber
CopyFileExA
CopyFileExW
CreateDirectoryExA
CreateFileA
CreateJobObjectW
CreateMutexA
CreateMutexW
CreateProcessInternalW
CreateSocketHandle
CreateTapePartition
CreateThread
CreateVirtualBuffer
DebugSetProcessKillOnExit
DecodeSystemPointer
DeleteTimerQueue
DisableThreadLibraryCalls
DisconnectNamedPipe
EncodePointer
EnumDateFormatsExA
EnumLanguageGroupLocalesA
EnumResourceLanguagesA
EnumSystemCodePagesW
EnumSystemGeoID
EnumSystemLocalesW
EnumTimeFormatsA
EnumTimeFormatsW
EnumUILanguagesA
ExpungeConsoleCommandHistoryA
FatalExit
FileTimeToDosDateTime
FindAtomA
FindFirstChangeNotificationW
GetBinaryTypeW
GetCPInfo
GetCPInfoExW
GetCommConfig
GetCommandLineA
GetCompressedFileSizeA
GetConsoleAliasExesLengthA
GetConsoleAliasExesLengthW
GetConsoleAliasesW
GetConsoleInputExeNameA
GetConsoleTitleW
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileType
GetHandleInformation
GetLinguistLangSize
GetModuleFileNameA
GetModuleHandleA
GetNumaNodeProcessorMask
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetThreadSelectorEntry
GetThreadTimes
GetUserDefaultLCID
GetVersion
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNamesForVolumeNameW
GlobalAddAtomW
GlobalGetAtomNameW
GlobalMemoryStatus
GlobalWire
HeapFree
HeapReAlloc
HeapUnlock
HeapValidate
IsBadWritePtr
IsValidUILanguage
LoadLibraryA
LocalAlloc
LocalHandle
LocalReAlloc
LocalSize
LockFileEx
NumaVirtualQueryNode
OpenSemaphoreA
OpenThread
OpenWaitableTimerW
PeekConsoleInputW
Process32First
QueryDepthSList
QueryDosDeviceW
ReadConsoleW
ReadDirectoryChangesW
RegisterWaitForInputIdle
RegisterWowExec
ReleaseMutex
ReleaseSemaphore
RemoveLocalAlternateComputerNameW
SearchPathA
SetClientTimeZoneInformation
SetCommMask
SetComputerNameExW
SetConsoleInputExeNameW
SetConsoleKeyShortcuts
SetConsoleLocalEUDC
SetConsoleNumberOfCommandsW
SetCriticalSectionSpinCount
SetDefaultCommConfigA
SetEndOfFile
SetEvent
SetFileShortNameW
SetInformationJobObject
SetLastConsoleEventActive
SetProcessPriorityBoost
SetThreadIdealProcessor
SetThreadLocale
SetTimerQueueTimer
SetUnhandledExceptionFilter
SetUserGeoID
SetVolumeMountPointA
ShowConsoleCursor
TlsAlloc
UTUnRegister
UnregisterWait
VerLanguageNameA
VirtualAllocEx
WriteConsoleOutputCharacterA
WritePrivateProfileSectionW
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcpynW
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ