Static task
static1
Behavioral task
behavioral1
Sample
5917b696d9ff62f8e6d6ffa323a060e2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5917b696d9ff62f8e6d6ffa323a060e2.exe
Resource
win10v2004-20231215-en
General
-
Target
5917b696d9ff62f8e6d6ffa323a060e2
-
Size
228KB
-
MD5
5917b696d9ff62f8e6d6ffa323a060e2
-
SHA1
f360fb6bf30b38aab8490e5029e6e49208843d4d
-
SHA256
e8fbdbcff8a268d82899026692ceec1b268a19c91f7f2b5d6820d128fe31fc73
-
SHA512
35fb8d94756b2dabcba7a6f19a4450c85a73c2f31650c3eebb1981e6c99a3d181a9a8e408961fe1734518c8af5ea7b448e59a2db6341433de289bc57c0843036
-
SSDEEP
3072:2cCdii/tKWlPzJGGm3W8aXhBQo0C+qfLA0/jQheap1+DGydY56oassJ4liHyJ:2aPWlPzPEaRBr7BkAJ4l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5917b696d9ff62f8e6d6ffa323a060e2
Files
-
5917b696d9ff62f8e6d6ffa323a060e2.exe windows:4 windows x86 arch:x86
fcdb7bf581ec628d1ca2473b74e3660f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
HeapFree
GetTimeZoneInformation
GetLocalTime
GetACP
ExitProcess
GetSystemTime
UnhandledExceptionFilter
HeapAlloc
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RaiseException
HeapReAlloc
HeapSize
FreeEnvironmentStringsA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
SetErrorMode
HeapDestroy
GetThreadLocale
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
RtlUnwind
GetCommandLineA
GetStartupInfoA
GetFileAttributesA
GetFileTime
GetFileSize
GetTickCount
GetVolumeInformationA
GetFullPathNameA
FindFirstFileA
FindClose
UnlockFile
SetEndOfFile
SetFilePointer
LockFile
FlushFileBuffers
CreateFileA
WriteFile
ReadFile
HeapCreate
VirtualFree
GetCurrentProcess
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
DuplicateHandle
GetStringTypeW
GetProfileStringA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GetLastError
GlobalFlags
lstrcpynA
MulDiv
SetLastError
FormatMessageA
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
CloseHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
IsBadReadPtr
SetUnhandledExceptionFilter
SetEnvironmentVariableA
LoadResource
user32
SetRect
MessageBeep
CharUpperA
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
GetSysColorBrush
GetDesktopWindow
PtInRect
GetClassNameA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
PostQuitMessage
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CopyAcceleratorTableA
GetNextDlgGroupItem
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
ScreenToClient
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
CharNextA
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetFocus
SetCursor
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
InvalidateRect
LoadIconA
LoadCursorA
EnableWindow
AdjustWindowRectEx
SetFocus
LoadBitmapA
DrawFocusRect
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
gdi32
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
CreateDIBitmap
CreateCompatibleDC
BitBlt
LineTo
MoveToEx
GetTextExtentPointA
IntersectClipRect
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
SetViewportOrgEx
SetMapMode
OffsetViewportOrgEx
GetStockObject
SetBkMode
RestoreDC
SaveDC
SelectObject
DeleteDC
CreateBitmap
SetBkColor
SetTextColor
GetObjectA
CreatePen
GetClipBox
CreateSolidBrush
Rectangle
Ellipse
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
olepro32
ord253
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantChangeType
SysAllocString
VariantCopy
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ