Static task
static1
Behavioral task
behavioral1
Sample
5bbbb8d6a54d686b060d239a323c2127.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bbbb8d6a54d686b060d239a323c2127.exe
Resource
win10v2004-20231215-en
General
-
Target
5bbbb8d6a54d686b060d239a323c2127
-
Size
12.4MB
-
MD5
5bbbb8d6a54d686b060d239a323c2127
-
SHA1
8ca22413afbeadfe1a03304441819f002734088c
-
SHA256
2c8b3688a091e5e4e73e451122e85f0e552e7721c1963208031a03574bd97429
-
SHA512
cf1c83e5cee760eb2cf495ba4460ce2b4c2fb451c328652aafbea93e15a208bb30219fcc0992206608e4a35c7eb42ccd138e6c4e965956f9ab2f11b8ad8a27d4
-
SSDEEP
49152:DHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHn:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bbbb8d6a54d686b060d239a323c2127
Files
-
5bbbb8d6a54d686b060d239a323c2127.exe windows:5 windows x86 arch:x86
65cee1cc96d935afa5d7eb55e18fefb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
FindFirstFileW
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
OpenSemaphoreA
CreateDirectoryExA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
WriteFileGather
FindResourceExA
GetPrivateProfileStructW
SetVolumeMountPointA
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CreateFileW
CompareStringW
GetACP
lstrlenW
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
HeapReAlloc
SetCurrentDirectoryA
OpenMutexW
IsDBCSLeadByteEx
GetProcAddress
SetVolumeLabelW
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
SetFileApisToOEM
Process32FirstW
OpenWaitableTimerW
LocalAlloc
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
CloseHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
RaiseException
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
DecodePointer
ExitProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
IsProcessorFeaturePresent
FlushFileBuffers
user32
GetCursorInfo
GetMenuInfo
GetMessageTime
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.1MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ