Static task
static1
Behavioral task
behavioral1
Sample
be4b14ddb9050620fdefb3a16caa272de44033b32e7cc9af14090459b8f9e3d0.exe
Resource
win7-20231215-en
General
-
Target
be4b14ddb9050620fdefb3a16caa272de44033b32e7cc9af14090459b8f9e3d0
-
Size
2.5MB
-
MD5
d78aea8e9cfd7d64f9e1000353d16f4c
-
SHA1
7fb609b0da39802dc5f63933a3338e964b2dfe4d
-
SHA256
be4b14ddb9050620fdefb3a16caa272de44033b32e7cc9af14090459b8f9e3d0
-
SHA512
e19a617a454f5aa03441d31b2cfb265cb339f0e366c8064c8f8a921f6f7b164395fb4ba3d86f3a2ac8306b1a9d751dbb06473a443e7d3198f2c29795506215bb
-
SSDEEP
49152:4cGJbpgcOVmQ+ljS7yLfijfzQwMWjoFznhMJpuPb3vKtRuIBFnk:5GJbp4VmQ+ljS2LfijbQwMWFJkz3vK+C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be4b14ddb9050620fdefb3a16caa272de44033b32e7cc9af14090459b8f9e3d0
Files
-
be4b14ddb9050620fdefb3a16caa272de44033b32e7cc9af14090459b8f9e3d0.exe windows:5 windows x86 arch:x86
eb69f0c87e9cd93936c077273dd938a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringW
GetModuleHandleW
lstrcmpW
lstrcpyA
lstrcatA
lstrlenA
WideCharToMultiByte
FindClose
FindFirstFileW
FindNextFileW
GetSystemDirectoryW
LoadResource
LockResource
SizeofResource
FindResourceW
lstrcatW
lstrlenW
MultiByteToWideChar
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
DecodePointer
RaiseException
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
GetStringTypeW
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
GetProcAddress
LoadLibraryExA
InitializeCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
LocalAlloc
LocalReAlloc
LocalFree
OutputDebugStringA
EncodePointer
SetLastError
GetCurrentThreadId
GetModuleHandleA
LoadLibraryExW
LoadLibraryA
LoadLibraryW
GlobalDeleteAtom
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
GetThreadLocale
MulDiv
GlobalSize
FormatMessageW
CopyFileW
CloseHandle
WaitForSingleObject
CreateEventW
SetThreadPriority
ResumeThread
GetCurrentThread
GetVersionExW
lstrcmpA
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetCurrentProcessId
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GlobalFlags
GlobalGetAtomNameW
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetFileAttributesW
GetFileTime
GetFullPathNameW
GetTempFileNameW
CreateFileW
DeleteFileW
FlushFileBuffers
GetFileSize
GetVolumeInformationW
LockFile
ReadFile
SetEndOfFile
SetFilePointer
UnlockFile
WriteFile
DuplicateHandle
GetCurrentProcess
lstrcmpiW
GetTickCount
GetCurrentDirectoryW
lstrcpyW
FindResourceExW
GetFileAttributesExW
GetFileSizeEx
SetErrorMode
GetWindowsDirectoryW
VerSetConditionMask
VerifyVersionInfoW
GetTempPathW
GetProfileIntW
SearchPathW
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
GetCommandLineA
GetCommandLineW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
VirtualAlloc
HeapQueryInformation
QueryPerformanceFrequency
SetStdHandle
GetFileType
GetStdHandle
ExitProcess
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
oledlg
OleUIBusyW
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 704KB - Virtual size: 708KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE