Static task
static1
Behavioral task
behavioral1
Sample
5be0febcb689e6519e59d88480884893.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5be0febcb689e6519e59d88480884893.exe
Resource
win10v2004-20231215-en
General
-
Target
5be0febcb689e6519e59d88480884893
-
Size
31KB
-
MD5
5be0febcb689e6519e59d88480884893
-
SHA1
d7130ac3022eafb72499e601a9612c85cecadd8d
-
SHA256
a37c9e625bc6a12126a41751dda19f6d768471b76cb7eb130bb60d396c10ec19
-
SHA512
c5efc17d44d9ea3ae0a43e7d5ff9617343c4d4c2ea71dbcbde8e607064f2a0acb32ce8939fe0734fefe345b3f0c786e4993596341047f8b75844ab095be241e6
-
SSDEEP
384:x6K/O/vQMprbLk738UD09w6kolkxi5lRwZ3xkET+WnhVh9IsOMFMmyKJ2:T/OAeg7tD06jlMlRkkq+EH6MF/yKJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5be0febcb689e6519e59d88480884893
Files
-
5be0febcb689e6519e59d88480884893.exe windows:5 windows x86 arch:x86
6e318180fe6b8e7438d6d0c313d31cfe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LZRead
DuplicateHandle
ClearCommBreak
SetHandleContext
GetThreadSelectorEntry
GetDllDirectoryA
ReleaseSemaphore
SetFileAttributesA
VirtualAllocEx
GlobalDeleteAtom
GetSystemWindowsDirectoryA
GetProcessWorkingSetSize
GetTickCount
IsBadCodePtr
GetVolumePathNameA
BuildCommDCBAndTimeoutsA
PulseEvent
SetConsoleCP
OpenWaitableTimerA
FatalExit
GetEnvironmentStringsA
GetFileAttributesExA
ReadConsoleA
GetVersion
SetVolumeMountPointA
GetThreadPriorityBoost
CreateSemaphoreA
GetSystemDefaultLCID
HeapSize
GetConsoleCursorInfo
SetProcessShutdownParameters
IsBadWritePtr
HeapReAlloc
WaitForMultipleObjectsEx
SetVolumeLabelA
GlobalDeleteAtom
GetFileSize
OpenJobObjectA
GetProcessShutdownParameters
FreeEnvironmentStringsA
LocalHandle
GetPrivateProfileStructA
SetLocalTime
GlobalLock
_lopen
WriteConsoleOutputCharacterW
SetFileAttributesA
HeapDestroy
ResetEvent
LZOpenFileA
GetCurrentDirectoryA
GlobalFindAtomA
EnumTimeFormatsA
OutputDebugStringA
GetConsoleScreenBufferInfo
GetFileSizeEx
GlobalFree
GetPrivateProfileSectionNamesA
GetDefaultCommConfigA
GetFileTime
GetDateFormatA
DeleteTimerQueueTimer
GetConsoleCharType
GetThreadPriority
LocalSize
GetPrivateProfileSectionNamesA
SetConsoleLocalEUDC
GetCPInfoExA
WriteFile
ClearCommError
MulDiv
GetDefaultCommConfigA
FindResourceExA
CreateDirectoryExW
GlobalSize
CloseConsoleHandle
Heap32ListFirst
GetLogicalDrives
WriteConsoleInputA
DefineDosDeviceA
UnlockFile
GetLastError
user32
MonitorFromWindow
ScrollChildren
LoadCursorA
ExitWindowsEx
GetKeyNameTextA
DrawFrameControl
FreeDDElParam
SystemParametersInfoA
GetSysColorBrush
DefFrameProcA
CreateDialogIndirectParamA
SetProcessWindowStation
GetWindowTextA
GetIconInfo
ScrollWindow
BroadcastSystemMessageExA
RegisterClassExA
SetPropA
GetClipboardFormatNameA
ToUnicode
SetParent
GetUpdateRgn
GetWindowTextA
PrivateExtractIconsA
UnhookWinEvent
GetWindowContextHelpId
OemToCharBuffA
IsWindowInDestroy
SetLayeredWindowAttributes
AnimateWindow
CharUpperBuffW
RegisterClipboardFormatA
CreateIcon
GetDlgItemTextA
InvalidateRgn
BringWindowToTop
RegisterShellHookWindow
IsCharUpperA
version
GetFileVersionInfoA
comdlg32
GetFileTitleA
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ