Static task
static1
Behavioral task
behavioral1
Sample
b5eaf3948d555a428ce1fee9f0451ba0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b5eaf3948d555a428ce1fee9f0451ba0.exe
Resource
win10v2004-20240226-en
General
-
Target
b5eaf3948d555a428ce1fee9f0451ba0
-
Size
383KB
-
MD5
b5eaf3948d555a428ce1fee9f0451ba0
-
SHA1
e1c4fe5e6e6b2b0cbd714c4faf4b915c38466aec
-
SHA256
56d44500443d1698645b23b549f4fe49deded75b7aa96c18bc3d11242f84636c
-
SHA512
d19c1361e484d82674ce6d75551cd780baeefa99730505f4b4a8e16e3ffbb45725c8a8af429aa9aa96037b90a1f587f6d770da6cd65f8be86134b61080db3b13
-
SSDEEP
6144:mBiieeeeeeFeeeeeeeeeeeee6eeeeeeeeeeeeeeeeeee2eeebeeeeeeeeeeeeeeF:mikem1hwxhgqAGPDTlWts
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5eaf3948d555a428ce1fee9f0451ba0
Files
-
b5eaf3948d555a428ce1fee9f0451ba0.exe windows:4 windows x86 arch:x86
4b886751c5321f046968b548c466a93e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryW
lstrcatW
CreateFileW
ReadFile
LoadLibraryW
GetProcAddress
user32
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
SetScrollRange
SetScrollPos
ScrollWindow
SendMessageA
DefWindowProcA
gdi32
GetStockObject
msvcrt
memset
advapi32
RegOpenKeyExW
Sections
.text Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ