Static task
static1
Behavioral task
behavioral1
Sample
5b4afc7dc30647ce4ac338596c909330f36933a2f442475311522726732e2f83.exe
Resource
win10v2004-20240426-en
General
-
Target
5b4afc7dc30647ce4ac338596c909330f36933a2f442475311522726732e2f83
-
Size
249KB
-
MD5
2fb295a9d703d911074cb65561204515
-
SHA1
ef1941b1c17fc9edc1352d3722bf522601cb658e
-
SHA256
5b4afc7dc30647ce4ac338596c909330f36933a2f442475311522726732e2f83
-
SHA512
8053400feaad4b47ae68fef5b0995856b772cbe5004c748d960fc30c28dc89d38341b1b601e06758e64ef111d0706a2ab6a180e55405d82246be55a5a43083d2
-
SSDEEP
3072:1KuTUfSiyWwfftB/d7jEsRYNanQzc6PZmeMLg5ESFO/IYE:/UYWWlB/d/HuIQc6BmeMLaFQE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4afc7dc30647ce4ac338596c909330f36933a2f442475311522726732e2f83
Files
-
5b4afc7dc30647ce4ac338596c909330f36933a2f442475311522726732e2f83.exe windows:5 windows x86 arch:x86
0bda43dbc99650e3960b130403865133
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
GetConsoleAliasA
InterlockedDecrement
ZombifyActCtx
GetComputerNameW
GetTimeFormatA
FreeEnvironmentStringsA
GetModuleHandleW
EnumTimeFormatsW
WriteConsoleOutputA
InterlockedPopEntrySList
SetConsoleMode
GetFileAttributesW
TryEnterCriticalSection
CompareStringW
GetShortPathNameA
GetConsoleAliasesW
SetLastError
GetProcAddress
BackupWrite
LocalLock
LoadLibraryA
GetFileType
HeapWalk
SetConsoleTitleW
BuildCommDCBA
LocalFileTimeToFileTime
GetModuleFileNameW
GlobalDeleteAtom
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
advapi32
OpenThreadToken
winhttp
WinHttpReadData
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ