Static task
static1
Behavioral task
behavioral1
Sample
c5bf130482f62d4c07230ee41c59ba0b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5bf130482f62d4c07230ee41c59ba0b.exe
Resource
win10v2004-20240226-en
General
-
Target
c5bf130482f62d4c07230ee41c59ba0b
-
Size
1.0MB
-
MD5
c5bf130482f62d4c07230ee41c59ba0b
-
SHA1
1ad293f951888ae106194a2005862402485de82e
-
SHA256
72835cf8001cb578c425157737b26da776d708cc114c4f1e4d973fb64e0f18ee
-
SHA512
484f49e77310a9d445342baefb625b207d2971234f2dd2863e9c2e716aba0cbb08fac0c10cc9abf027688a3db3cc50eff0d01721002ca23dcf909cb5cdaa8482
-
SSDEEP
12288:2+rzTzjqinuEL7n0sHlDjKseFal5N0y2XICQBdKQwLzzV+XMhQfigC:2+/nrfn/FDENedKQwLl+XyJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5bf130482f62d4c07230ee41c59ba0b
Files
-
c5bf130482f62d4c07230ee41c59ba0b.exe windows:0 windows x86 arch:x86
2c351a01263c1e2a785627e6a6300658
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
BaseCleanupAppcompatCacheSupport
ChangeTimerQueueTimer
CmdBatNotification
CommConfigDialogW
CompareStringA
ConvertDefaultLocale
ConvertThreadToFiber
CopyFileExA
CopyFileExW
CreateDirectoryExA
CreateFileA
CreateJobObjectW
CreateMutexA
CreateMutexW
CreateProcessInternalW
CreateSocketHandle
CreateTapePartition
CreateThread
CreateVirtualBuffer
DebugSetProcessKillOnExit
DecodeSystemPointer
DeleteTimerQueue
DisableThreadLibraryCalls
DisconnectNamedPipe
EncodePointer
EnumDateFormatsExA
EnumLanguageGroupLocalesA
EnumResourceLanguagesA
EnumSystemCodePagesW
EnumSystemGeoID
EnumSystemLocalesW
EnumTimeFormatsA
EnumTimeFormatsW
EnumUILanguagesA
ExpungeConsoleCommandHistoryA
FatalExit
FileTimeToDosDateTime
FindAtomA
FindFirstChangeNotificationW
GetBinaryTypeW
GetCPInfo
GetCPInfoExW
GetCommConfig
GetCommandLineA
GetCompressedFileSizeA
GetConsoleAliasExesLengthA
GetConsoleAliasExesLengthW
GetConsoleAliasesW
GetConsoleInputExeNameA
GetConsoleTitleW
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileType
GetHandleInformation
GetLinguistLangSize
GetModuleFileNameA
GetModuleHandleA
GetNumaNodeProcessorMask
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetThreadSelectorEntry
GetThreadTimes
GetUserDefaultLCID
GetVersion
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNamesForVolumeNameW
GlobalAddAtomW
GlobalGetAtomNameW
GlobalMemoryStatus
GlobalWire
HeapFree
HeapReAlloc
HeapUnlock
HeapValidate
IsBadWritePtr
IsValidUILanguage
LoadLibraryA
LocalAlloc
LocalHandle
LocalReAlloc
LocalSize
LockFileEx
NumaVirtualQueryNode
OpenSemaphoreA
OpenThread
OpenWaitableTimerW
PeekConsoleInputW
Process32First
QueryDepthSList
QueryDosDeviceW
ReadConsoleW
ReadDirectoryChangesW
RegisterWaitForInputIdle
RegisterWowExec
ReleaseMutex
ReleaseSemaphore
RemoveLocalAlternateComputerNameW
SearchPathA
SetClientTimeZoneInformation
SetCommMask
SetComputerNameExW
SetConsoleInputExeNameW
SetConsoleKeyShortcuts
SetConsoleLocalEUDC
SetConsoleNumberOfCommandsW
SetCriticalSectionSpinCount
SetDefaultCommConfigA
SetEndOfFile
SetEvent
SetFileShortNameW
SetInformationJobObject
SetLastConsoleEventActive
SetProcessPriorityBoost
SetThreadIdealProcessor
SetThreadLocale
SetTimerQueueTimer
SetUnhandledExceptionFilter
SetUserGeoID
SetVolumeMountPointA
ShowConsoleCursor
TlsAlloc
UTUnRegister
UnregisterWait
VerLanguageNameA
VirtualAllocEx
WriteConsoleOutputCharacterA
WritePrivateProfileSectionW
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcpynW
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ