Static task
static1
Behavioral task
behavioral1
Sample
5bc1989d85812f0c94b32442d556fe92.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bc1989d85812f0c94b32442d556fe92.exe
Resource
win10v2004-20231215-en
General
-
Target
5bc1989d85812f0c94b32442d556fe92
-
Size
458KB
-
MD5
5bc1989d85812f0c94b32442d556fe92
-
SHA1
4dc17be23d9f59c06a705ae393d173f2e2804858
-
SHA256
35797b442e20cc144bb52334ff19f9f56d6d09f519cfad0432eef868bb1e78e7
-
SHA512
d34bd0f1e6ebb0371c44e594b1580a530effa9d78791b9a03e2cca8dcf4d7493c871f71b95c506027b7bf69e0b3e93caf0e061b39b09f202c968aa52e898f6e0
-
SSDEEP
6144:f9pZRr7j2XVVSvP6xv+2qVX7SfC69LwxpdfMeHYX1YpaUDzRsNW3o:jrnysvixW5SfD9LwxpdfZ4FYE2x3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bc1989d85812f0c94b32442d556fe92
Files
-
5bc1989d85812f0c94b32442d556fe92.exe windows:5 windows x86 arch:x86
68a0323da6d5603ec585dfe693d2f7a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetLastError
WideCharToMultiByte
Sleep
Beep
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceA
GetLogicalDrives
SetErrorMode
FindFirstFileW
FindNextFileW
GetCurrentThreadId
TlsSetValue
TlsGetValue
GetCommandLineA
GetVersionExA
GetFileAttributesA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
GetFullPathNameA
GetDriveTypeA
GetCurrentProcessId
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
GetFileAttributesW
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetFileAttributesW
GetFullPathNameW
CreateDirectoryW
DeleteFileW
MoveFileW
RemoveDirectoryW
GetDriveTypeW
MoveFileA
RaiseException
RtlUnwind
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
IsBadCodePtr
CloseHandle
GetExitCodeProcess
WaitForSingleObject
GetProcAddress
LoadLibraryA
FreeLibrary
CreateProcessA
CreateProcessW
HeapReAlloc
GetModuleHandleA
HeapFree
GetModuleFileNameA
HeapAlloc
GetProcessHeap
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapValidate
HeapCompact
HeapWalk
HeapSize
VirtualProtect
GetSystemInfo
VirtualQuery
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
ReadConsoleA
SetConsoleMode
GetConsoleMode
IsDBCSLeadByteEx
GetConsoleCP
ReadConsoleW
SetEndOfFile
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
DuplicateHandle
GetCurrentProcess
GetFileInformationByHandle
PeekNamedPipe
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
ReadConsoleInputW
LockFile
UnlockFile
SetFilePointer
CreateFileA
CreatePipe
ReadFile
CreateFileW
WriteFile
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
CompareStringA
CompareStringW
GetLocaleInfoA
GetLocaleInfoW
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetConsoleCtrlHandler
GetCommandLineW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSection
SetLastError
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
InterlockedExchange
ExitProcess
TlsFree
GetCurrentThread
TlsAlloc
ExitThread
ResumeThread
CreateThread
GetModuleFileNameW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
GetLocalTime
SetLocalTime
GetTickCount
QueryPerformanceCounter
TerminateProcess
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 13B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aadata Size: 2KB - Virtual size: 483B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.o99pa Size: 2KB - Virtual size: 115B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.o9code Size: 2KB - Virtual size: 242B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aao Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bba Size: 2KB - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iq Size: 2KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oooa Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb2 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb3 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb4 Size: 2KB - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb5 Size: 2KB - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb6 Size: 2KB - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb7 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.obb9 Size: 2KB - Virtual size: 30B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oaps Size: 2KB - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sef Size: 2KB - Virtual size: 110B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sef0 Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sef3 Size: 2KB - Virtual size: 110B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sef4 Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 2KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 374B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ