Static task
static1
Behavioral task
behavioral1
Sample
5c088ffa23a3cf109e64bd82c4c1e956.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c088ffa23a3cf109e64bd82c4c1e956.exe
Resource
win10v2004-20231215-en
General
-
Target
5c088ffa23a3cf109e64bd82c4c1e956
-
Size
131KB
-
MD5
5c088ffa23a3cf109e64bd82c4c1e956
-
SHA1
ceb6015288346cb3bb964d107456f7942063fe78
-
SHA256
e20bb80dfd0821cbad53811f680c8da8a5436390f512976d42f0bd9e00e4540b
-
SHA512
6aa3c2a31f69e4c9a77ae8a86fae374f5a36bd8a90af956e799b7afcb655fc19bf3f78cf72b526683e77f82368c350332b3b111d198634675d2ff246be9fcd5f
-
SSDEEP
3072:sdudTvig3QYDOHIGefUn2RtacNiRMJGAJDQwGNVQiYFfzM:sdudTag3QYDOHIGefVFN26GAtQwGN5qg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c088ffa23a3cf109e64bd82c4c1e956
Files
-
5c088ffa23a3cf109e64bd82c4c1e956.exe windows:4 windows x86 arch:x86
e8e6a7f2865610045ae8d4a245040cd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
CloseHandle
lstrcmpiA
CreateToolhelp32Snapshot
GetProcAddress
LoadLibraryA
ExitProcess
ReadFile
SetFilePointer
CreateFileA
FreeResource
WriteFile
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
WinExec
GetLastError
CreateMutexA
Sleep
CreateThread
GetCurrentThreadId
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strchr
_except_handler3
malloc
realloc
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ