Static task
static1
Behavioral task
behavioral1
Sample
be5865ff59d4cbf5ecbcb5102b27533b.exe
Resource
win7-20240221-en
General
-
Target
be5865ff59d4cbf5ecbcb5102b27533b
-
Size
122KB
-
MD5
be5865ff59d4cbf5ecbcb5102b27533b
-
SHA1
7f572b51226105d5db18c90b61f3a25bd6c78c06
-
SHA256
50a11fbee6a6e8c76fcc1c5ab63420ea70ec37b995a4fc6beda0e56f91c8b676
-
SHA512
72c78d602b6decc9a83292ae47d57543c297ea4ebfcbb05fe0e91e11be74cde09be04dfac7a08c3b525957412c9fb9cabb2f6e9b46b04b05a640ec83ed9cd003
-
SSDEEP
3072:jp4QeJsxXYClfk6y6SyBgKGg/C2p6ztO73KpfsMhpql:2QeCpBOKQg3p6zQ7Wf2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be5865ff59d4cbf5ecbcb5102b27533b
Files
-
be5865ff59d4cbf5ecbcb5102b27533b.exe windows:4 windows x86 arch:x86
8687bfeaf619ab29d0a4f78354bb866b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
kernel32
ExitProcess
WaitForSingleObject
CreateThread
lstrcatA
GetLastError
CreateMutexA
lstrcmpA
lstrcpyA
GetModuleFileNameA
lstrlenA
LoadLibraryA
GetCommandLineA
WriteProcessMemory
lstrlenW
GetModuleFileNameW
Sleep
ReadProcessMemory
GetModuleHandleA
GetCurrentProcess
IsDebuggerPresent
lstrcmpiA
GetProcAddress
HeapFree
GetEnvironmentVariableA
HeapAlloc
GetStartupInfoA
GetProcessHeap
FreeConsole
user32
UpdateWindow
GetSysColor
TrackPopupMenu
MessageBoxW
GetWindowRect
SetWindowLongA
DefWindowProcA
SetTimer
TranslateMessage
gdi32
CreateDIBitmap
DeleteDC
comdlg32
ChooseFontA
PrintDlgA
shell32
SHGetFileInfoA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE