Static task
static1
Behavioral task
behavioral1
Sample
5b4957eb05c547c31b2e3487b05c140b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b4957eb05c547c31b2e3487b05c140b.exe
Resource
win10v2004-20231222-en
General
-
Target
5b4957eb05c547c31b2e3487b05c140b
-
Size
40KB
-
MD5
5b4957eb05c547c31b2e3487b05c140b
-
SHA1
6f6202e37019867537c7d7717e231b334e8b09ce
-
SHA256
e1d214e056acc921fcf006f98ea6188caa6f7f31e413e28d0abc53ac7d1202fa
-
SHA512
a60fb4cad50ca6ebe255eaa344843287f3fc29fd3bb5591a4f6cc8f00c19fa575aad219c810e3f8db4d39dc5b2b6af9a5d1d7795c24b4ce709492123edfdce17
-
SSDEEP
384:4/3ROc+IyvdlNiJwhSmfxeJO83swCiWE1lETaEv0shOuJuOwdhbyVKo:4fRIImpiuRfT2s/iWE1BEzPJuOkbyV/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4957eb05c547c31b2e3487b05c140b
Files
-
5b4957eb05c547c31b2e3487b05c140b.exe windows:5 windows x86 arch:x86
3eb3c8c63a8f0f1ef5b2dd3e0ed2878c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
WriteFile
GetModuleFileNameA
GetTempPathA
Sleep
OutputDebugStringA
GetLastError
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
GetSystemDirectoryA
GetWindowsDirectoryA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
FreeResource
SetFileAttributesA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetSystemTimeAsFileTime
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
msvcr90
fopen
remove
fwrite
??2@YAPAXI@Z
memcpy
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
fclose
strlen
malloc
sprintf
free
memset
strcpy
strcat
strrchr
??3@YAXPAX@Z
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ