Static task
static1
Behavioral task
behavioral1
Sample
b5e492f62f2de9b5670637ac960f9cef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5e492f62f2de9b5670637ac960f9cef.exe
Resource
win10v2004-20240226-en
General
-
Target
b5e492f62f2de9b5670637ac960f9cef
-
Size
176KB
-
MD5
b5e492f62f2de9b5670637ac960f9cef
-
SHA1
3a4cfbcd62812da73648e2037760bb587173f73f
-
SHA256
e535a6343d6c2c71628e2131fd898cd49a828e0402af2b3a8a157b4e6a1dba65
-
SHA512
981c2c9eb982e06a099d87b7300c1cc6a6ddb861d1c50db52e54fd64d3128e78cde3d1d9d5b527c73ba2d72a9f0caba705ca442fa273ba8ecd3461b63acc13aa
-
SSDEEP
1536:zwykUZmitTjYmPhzjnp7mVLQATEMVWtBjQEXBdrR4xUXOI+jHaKPeljDR9NOg:TtT80jp7CLQfM+QEHyxq2HrqjljOg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5e492f62f2de9b5670637ac960f9cef
Files
-
b5e492f62f2de9b5670637ac960f9cef.exe windows:4 windows x86 arch:x86
24eb7c9b30455aabff03cf5f479ec490
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleFileNameA
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetVersionExA
GetLastError
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetModuleHandleA
WinExec
CreateFileA
GetFileAttributesExA
SetFileTime
CloseHandle
GetSystemDirectoryA
Sleep
user32
DispatchMessageA
RegisterClassExA
GetDesktopWindow
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
DefWindowProcA
PostQuitMessage
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
advapi32
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
DeleteService
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
fflush
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
strstr
strchr
atoi
wcslen
_access
fopen
fwrite
_strlwr
sprintf
srand
time
??3@YAXPAX@Z
rand
??2@YAPAXI@Z
fclose
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
udata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ