Static task
static1
Behavioral task
behavioral1
Sample
d5a2448445acee04e0ab07e2666d4dc5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d5a2448445acee04e0ab07e2666d4dc5.exe
Resource
win10v2004-20240226-en
General
-
Target
d5a2448445acee04e0ab07e2666d4dc5
-
Size
640KB
-
MD5
d5a2448445acee04e0ab07e2666d4dc5
-
SHA1
f30d70b02dd287f0bcd8601b65381ba26716c383
-
SHA256
e1e49a4fee0e6f20b90a50954ef44ce67b50e75f2727d6ed12a823e648cab937
-
SHA512
3e8daf1a85621707b96c09467c830949e2f4194bbc5a383029a5031e96e0495bca0dde29f7d798ba9f740778a4a7545bf0e21e912eca5aee46e3ed83cd328ba0
-
SSDEEP
12288:Bqw5T9IszGYrjQ0IqmVL1OuFSHgrpFz0UYGmgZhllPiNj7bhvJE7UH:1b3zjrjQVlVpOucHYIcmAnM7bhBoUH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5a2448445acee04e0ab07e2666d4dc5
Files
-
d5a2448445acee04e0ab07e2666d4dc5.exe windows:4 windows x86 arch:x86
af4e4b390dfae32202db4dcaa8228d77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetFileAttributesA
CreateDirectoryA
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
GetWindowsDirectoryA
lstrcmpiA
ReadFile
GetFileSize
CreateProcessA
CopyFileA
RemoveDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcess
GetCommandLineA
SetCurrentDirectoryA
GetFullPathNameA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
GetProcAddress
LoadLibraryA
ExitThread
FindNextFileA
Sleep
CreateThread
TerminateThread
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetStdHandle
GetStdHandle
SetHandleCount
SetEndOfFile
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
FindFirstFileA
lstrcmpA
MultiByteToWideChar
FindClose
GetEnvironmentVariableA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
HeapFree
HeapAlloc
GetLastError
GetFileType
WriteFile
SetFilePointer
ExitProcess
TerminateProcess
RtlUnwind
GetStartupInfoA
GetVersion
GetStringTypeA
user32
SetWindowTextA
DefWindowProcA
DestroyWindow
CreateWindowExA
LoadCursorA
RegisterClassExA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostQuitMessage
PostMessageA
EnableWindow
ShowWindow
UpdateWindow
LoadStringA
WaitForInputIdle
MessageBoxA
DialogBoxParamA
EndDialog
SetDlgItemTextA
LoadIconA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
FindExecutableA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ