Static task
static1
Behavioral task
behavioral1
Sample
5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998.exe
Resource
win10v2004-20240508-en
General
-
Target
5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998.exe
-
Size
377KB
-
MD5
98cc7dd8eeeaf079b8e8f650d847525f
-
SHA1
2f8bdb79155ce50f7b02209cd28f996fc9e62915
-
SHA256
5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998
-
SHA512
24de92368cf508ac40db171f891075c67a90d71fa9febefc8cce4218c4d248870dcca240347e7bfc39b66a52477c3b0b9b9cd0fe478fafd226ce092147b2a92f
-
SSDEEP
6144:4i4TBXZh3Am19Lk/8LS35qQkOLwfFGIMcPayeMlTDIeuhDF28VBUJpEzubg66:4isBXZh3Amr4/8YN9Lw4izIeuhDF28Vh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998.exe
Files
-
5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998.exe.exe windows:5 windows x86 arch:x86
8765057780dde950993dc56a99702829
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
VirtualAlloc
HeapCreate
LoadLibraryA
GetProcAddress
HeapAlloc
ExitThread
LocalFree
lstrlenW
GetTempPathW
LoadLibraryW
GetCurrentProcess
QueryDosDeviceW
GetFullPathNameW
GetLongPathNameW
GetModuleFileNameW
GetEnvironmentVariableW
GetCurrentProcessId
MoveFileExW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
GetVersion
CreateSemaphoreW
ReleaseSemaphore
GetFileInformationByHandle
CopyFileW
DeleteFileW
IsBadWritePtr
CreateFileW
SetFilePointer
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
GetProcessTimes
Process32NextW
GetCommandLineW
GetExitCodeThread
InterlockedExchange
DeleteCriticalSection
GetFileSizeEx
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
HeapReAlloc
VirtualFree
GetFileSize
ReadFile
GetStdHandle
ExitProcess
WaitForMultipleObjects
GetCurrentThreadId
LeaveCriticalSection
SetEvent
EnterCriticalSection
ResetEvent
SetProcessShutdownParameters
CreateThread
HeapSize
SetLastError
TlsFree
TlsSetValue
TerminateProcess
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
RaiseException
GetStartupInfoW
HeapFree
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleW
EnumResourceNamesW
InitializeCriticalSection
CreateEventW
SetUnhandledExceptionFilter
SetErrorMode
GetTickCount
CreateProcessW
SetFileAttributesW
WriteFile
WaitForSingleObject
Sleep
GetLastError
GetSystemInfo
GetDiskFreeSpaceExW
GetDriveTypeW
GetLogicalDriveStringsW
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
CloseHandle
GetFileTime
GetVersionExW
GetVolumeInformationW
GetVolumePathNameW
GetSystemDirectoryW
CreateFileA
InterlockedDecrement
InterlockedIncrement
user32
DrawIconEx
GetSysColorBrush
EndPaint
RedrawWindow
LoadImageW
BeginPaint
GetSysColor
SetTimer
EnableWindow
GetForegroundWindow
ShowWindow
DestroyWindow
FlashWindow
AttachThreadInput
SetCursor
CharLowerW
PostMessageW
GetCursorPos
KillTimer
MessageBoxW
LoadCursorW
GetSystemMetrics
ReleaseDC
GetDC
SetRect
SetFocus
DefWindowProcW
LoadStringW
SendMessageW
RegisterClassExW
CreateWindowExW
GetMessageW
DispatchMessageW
AdjustWindowRectEx
SetParent
IsDialogMessageW
TranslateMessage
SetWindowTextW
SetWindowPos
PostQuitMessage
SetWindowLongW
GetWindowLongW
gdi32
SetDIBitsToDevice
StretchBlt
BitBlt
CreateFontIndirectW
GetStockObject
GetObjectW
SelectObject
CreateBitmap
CreateCompatibleDC
GetDeviceCaps
StretchDIBits
gdiplus
GdipDeleteGraphics
GdipDeleteBrush
GdipDrawImageRectI
GdipFillRectangleI
GdipCreateSolidFill
GdipCreateFromHDC
GdipGetImageWidth
GdipLoadImageFromStream
GdiplusShutdown
GdiplusStartup
GdipDisposeImage
GdipGetImageHeight
shlwapi
StrCpyW
AssocQueryStringW
PathCreateFromUrlW
comctl32
InitCommonControlsEx
comdlg32
GetSaveFileNameW
advapi32
GetNamedSecurityInfoW
SetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueW
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CryptGenRandom
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
EqualSid
shell32
ord680
ord155
ShellExecuteW
SHOpenFolderAndSelectItems
ord190
SHGetFolderPathW
ole32
OleSetContainedObject
OleCreate
CoSetProxyBlanket
CoTaskMemFree
GetHGlobalFromStream
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitializeEx
OleLockRunning
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
wininet
HttpOpenRequestW
HttpSendRequestW
InternetQueryOptionW
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetConnectW
InternetSetOptionW
InternetOpenW
HttpQueryInfoA
powrprof
CallNtPowerInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ