Static task
static1
Behavioral task
behavioral1
Sample
05f70889faab9026b3f10a7c7d57d80ed8b86b3b4cf0531730f11990f1ce0d17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05f70889faab9026b3f10a7c7d57d80ed8b86b3b4cf0531730f11990f1ce0d17.exe
Resource
win10v2004-20231215-en
General
-
Target
05f70889faab9026b3f10a7c7d57d80ed8b86b3b4cf0531730f11990f1ce0d17
-
Size
8.5MB
-
MD5
36f483ebb13c2e7bea84e97e117062f4
-
SHA1
3f782b2398848dfdf63c7230b9b96d47c4268a97
-
SHA256
05f70889faab9026b3f10a7c7d57d80ed8b86b3b4cf0531730f11990f1ce0d17
-
SHA512
07c1527f27c0bcc68e94f8c1113411ebf1cb0a41020554a7417082ff22d086431c7a21b88ed437efd61aff29cc40ab56e402f0833542ed296c57815a32f2bf0e
-
SSDEEP
196608:CmmtcGjKom4Xhtblbr1S//m1In+V6FDHiwKCeysU:Pmtdl1bRuoIv7iRU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05f70889faab9026b3f10a7c7d57d80ed8b86b3b4cf0531730f11990f1ce0d17
Files
-
05f70889faab9026b3f10a7c7d57d80ed8b86b3b4cf0531730f11990f1ce0d17.exe windows:5 windows x86 arch:x86
d2d5781a373d7dfa010fda4516fdf177
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsDirectoryW
kernel32
GetLongPathNameW
GetFileSize
CloseHandle
GetFullPathNameW
CreateFileW
GetFileAttributesW
DeleteFileW
GetProcAddress
GetExitCodeProcess
GetLastError
WaitForSingleObject
LoadResource
FindClose
lstrcmpiW
LoadLibraryW
GetModuleFileNameW
CreateProcessW
GetCommandLineW
GetEnvironmentVariableW
FindResourceW
GetSystemDirectoryW
GetTempPathW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetDiskFreeSpaceW
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
QueryPerformanceCounter
FindNextFileW
GetVersionExW
WideCharToMultiByte
GetLocaleInfoW
GetNumberFormatW
GetConsoleTitleW
GetConsoleWindow
GetModuleHandleW
GetFullPathNameA
SetEnvironmentVariableA
SetEndOfFile
WriteConsoleW
HeapReAlloc
FreeLibrary
InterlockedExchange
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindFirstFileW
InitializeCriticalSectionAndSpinCount
PeekNamedPipe
GetFileInformationByHandle
SetFilePointer
GetCurrentProcessId
SetFileTime
GetTimeZoneInformation
DosDateTimeToFileTime
MultiByteToWideChar
EncodePointer
DecodePointer
SetStdHandle
GetFileType
EnterCriticalSection
LeaveCriticalSection
ReadConsoleW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
InterlockedDecrement
GetCPInfo
HeapFree
GetSystemTimeAsFileTime
ReadFile
FileTimeToLocalFileTime
FindFirstFileExW
GetDriveTypeW
FileTimeToSystemTime
MoveFileExW
SetFilePointerEx
HeapAlloc
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
Sleep
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
SetLastError
GetCurrentThread
GetCurrentThreadId
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
GetStringTypeW
GetProcessHeap
user32
LoadStringW
LoadIconW
LoadCursorW
FindWindowW
GetWindowLongW
DrawTextW
KillTimer
SetTimer
GetKeyState
SetDlgItemTextW
GetDlgItem
EndDialog
DialogBoxParamW
ShowWindow
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
gdi32
GetStockObject
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
Sections
.text Size: 504KB - Virtual size: 503KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ