Static task
static1
Behavioral task
behavioral1
Sample
5906590e8bab0cef0fb0ca43e0e39381.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5906590e8bab0cef0fb0ca43e0e39381.exe
Resource
win10v2004-20231215-en
General
-
Target
5906590e8bab0cef0fb0ca43e0e39381
-
Size
576KB
-
MD5
5906590e8bab0cef0fb0ca43e0e39381
-
SHA1
2bf4997a700fa48054a57a64a29142ac319c29b9
-
SHA256
c92d7e24bd6786c910cd3bfe3e39cd49b075524f9b071b5383811b20faeac3cd
-
SHA512
b5dfb828cd63da7bf0030a5e11c521cef7be310a510d461a46eb87937c1cb11fe5cc00e1d0b8166ce1636bb3a5283fcc7fbd72239921e85e3741f0e9ce167b82
-
SSDEEP
12288:QLT8z6ta9D6XJ2maL+Q7FCInlTYPdnecatsHqxUzveWAlUwTpHcceqEF:CT8z6ta9tmTrlneDteqyKW6UwT3m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5906590e8bab0cef0fb0ca43e0e39381
Files
-
5906590e8bab0cef0fb0ca43e0e39381.exe windows:4 windows x86 arch:x86
5b6a5b489b879c3f37567a0493688c95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
ExitProcess
SetConsoleCtrlHandler
IsBadReadPtr
ReadFile
GetStartupInfoW
CompareStringW
GetCurrentProcess
WaitNamedPipeA
UnhandledExceptionFilter
VirtualFreeEx
CommConfigDialogW
HeapAlloc
SetFilePointer
GetStringTypeW
GetSystemInfo
GetPrivateProfileStructW
FlushFileBuffers
VirtualQuery
GetSystemTimeAsFileTime
CreateDirectoryExA
TlsFree
DebugBreak
InitializeCriticalSection
GetFileAttributesW
GetLastError
WaitForSingleObjectEx
VirtualProtect
FoldStringW
FileTimeToLocalFileTime
DeleteCriticalSection
GetCurrentDirectoryW
GetCommandLineW
WideCharToMultiByte
EnumSystemLocalesA
SetStdHandle
GetTimeFormatW
CompareStringA
GetCurrentThread
IsValidCodePage
CreateMutexA
RtlUnwind
GetPrivateProfileSectionW
OpenMutexA
GetTimeZoneInformation
GetStdHandle
TlsSetValue
HeapDestroy
GetLocaleInfoW
GetFileType
TlsAlloc
LCMapStringW
GetTickCount
LocalLock
RtlFillMemory
LCMapStringA
IsBadWritePtr
SetConsoleScreenBufferSize
GlobalHandle
EnumResourceLanguagesW
EnumCalendarInfoExW
ReadConsoleInputA
GetEnvironmentStrings
GetUserDefaultLCID
EnterCriticalSection
GetFileAttributesExW
SetThreadLocale
QueryPerformanceCounter
GetDiskFreeSpaceW
HeapFree
GetVersionExA
SetHandleCount
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentVariableW
ResumeThread
GetCurrentProcessId
GetEnvironmentStringsW
SetLastError
GetCPInfo
EnumDateFormatsExA
CreateFileMappingA
FreeEnvironmentStringsW
VirtualAlloc
IsValidLocale
GetLocaleInfoA
GetOEMCP
SetEnvironmentVariableA
SetWaitableTimer
GlobalGetAtomNameA
WriteConsoleInputW
InterlockedExchange
HeapValidate
CopyFileExA
LocalFlags
MultiByteToWideChar
GetThreadSelectorEntry
FindNextFileA
GetACP
GetConsoleScreenBufferInfo
VirtualFree
TerminateProcess
GetStringTypeA
GetCurrentThreadId
WriteFile
GetModuleHandleA
InterlockedIncrement
HeapCreate
CreateFileW
GetProcAddress
OpenFile
HeapReAlloc
OutputDebugStringA
TlsGetValue
LeaveCriticalSection
OpenEventA
GetCommandLineA
GetEnvironmentStringsA
GetComputerNameW
LockFileEx
GetProcAddress
GetModuleFileNameA
CloseHandle
InterlockedDecrement
GetTimeFormatA
LoadLibraryA
GetDateFormatA
user32
DdeGetData
RegisterClassA
GetProcessWindowStation
LoadMenuIndirectA
FrameRect
MessageBoxW
CharNextExA
GetClassInfoA
LoadKeyboardLayoutW
ShowWindow
IsZoomed
CharToOemBuffW
ReuseDDElParam
SetWindowLongA
EmptyClipboard
RegisterClassExA
ChangeMenuW
DefWindowProcA
EndMenu
CreateAcceleratorTableA
DrawFocusRect
DlgDirSelectExA
ReleaseDC
GetDoubleClickTime
CountClipboardFormats
GetScrollInfo
LoadStringW
GetClipCursor
DdeCreateStringHandleW
CharLowerBuffA
GetCursorPos
CloseDesktop
EnumDisplayDevicesA
EnumDisplaySettingsA
CreateIconIndirect
GetWindowThreadProcessId
ToAscii
OemToCharBuffW
PeekMessageA
UnregisterHotKey
DdeQueryNextServer
EnableMenuItem
FlashWindowEx
DestroyCaret
TrackPopupMenuEx
CharPrevA
LoadImageA
EndDialog
CreateWindowExW
GetListBoxInfo
GetMessageTime
TileWindows
CheckMenuRadioItem
WinHelpA
MessageBoxIndirectW
DragObject
EndTask
InvalidateRgn
GetIconInfo
DdeQueryStringA
CloseWindow
ArrangeIconicWindows
DialogBoxIndirectParamA
UnhookWindowsHookEx
SetClassLongA
OpenWindowStationA
LoadMenuW
DestroyWindow
SetCapture
InSendMessage
GetNextDlgGroupItem
DdeConnectList
LookupIconIdFromDirectory
CreateDialogParamA
gdi32
TranslateCharsetInfo
PlayMetaFileRecord
PlayMetaFile
SetPixelV
CancelDC
OffsetWindowOrgEx
GetAspectRatioFilterEx
ScaleWindowExtEx
CheckColorsInGamut
GetTextExtentExPointA
PolyPolygon
CreateColorSpaceA
GetCharWidthFloatW
wininet
GetUrlCacheEntryInfoW
SetUrlCacheEntryInfoA
advapi32
CryptDuplicateKey
comdlg32
FindTextW
GetSaveFileNameW
GetFileTitleA
comctl32
ImageList_GetImageRect
CreateToolbarEx
ImageList_SetFilter
ImageList_GetBkColor
ImageList_Create
ImageList_EndDrag
DrawStatusTextW
InitCommonControlsEx
ImageList_DrawIndirect
ImageList_SetIconSize
CreatePropertySheetPageW
ImageList_Add
_TrackMouseEvent
ImageList_Write
ImageList_GetDragImage
ImageList_GetIcon
ImageList_DragShowNolock
ImageList_SetOverlayImage
ImageList_BeginDrag
ImageList_SetFlags
ImageList_DragLeave
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ