Static task
static1
Behavioral task
behavioral1
Sample
5869a6fd02f152d4e814c02283e327df0b845116e93cab10362e34b91fa11be8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5869a6fd02f152d4e814c02283e327df0b845116e93cab10362e34b91fa11be8.exe
Resource
win10v2004-20240508-en
General
-
Target
5869a6fd02f152d4e814c02283e327df0b845116e93cab10362e34b91fa11be8
-
Size
5.6MB
-
MD5
6d6648e6347568a0f179d3ca46b87643
-
SHA1
ea56f28f4bcc03abd2292280f4accaec92a2b4cb
-
SHA256
5869a6fd02f152d4e814c02283e327df0b845116e93cab10362e34b91fa11be8
-
SHA512
fa7b21320d718d99bd7065aa0d261e182d0dd33946116e9f633fd90562cd3f12a32db4983d26068e611294cb1cf5e5a952f548eaa13dbfe6e3289a839bfc79f0
-
SSDEEP
12288:u63vxu9SOhiBuTYbRCuIN5zX68//c3peEa1N8TUlPj6uLONYO3wMR8QMWBb4AYah:Dv8hOcMRCuS8K16TWTCfn8GhYrWwbyH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5869a6fd02f152d4e814c02283e327df0b845116e93cab10362e34b91fa11be8
Files
-
5869a6fd02f152d4e814c02283e327df0b845116e93cab10362e34b91fa11be8.exe windows:4 windows x86 arch:x86
05ecba14ae6ba36d9d29826081033d8d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetRect
GetMessageA
DefWindowProcA
BeginPaint
GetWindowWord
EndPaint
SetWindowWord
LoadIconA
RegisterClassA
OemToCharA
SetWindowTextA
OemToCharBuffA
LoadCursorA
UpdateWindow
SendMessageA
GetTopWindow
GetLastActivePopup
EnableWindow
PostMessageA
GetClientRect
ShowWindow
GetDC
SetTimer
GetSysColor
ReleaseDC
SetCursor
KillTimer
PostQuitMessage
DialogBoxIndirectParamA
GetWindowRect
GetSystemMetrics
SetWindowPos
GetDlgItemTextA
EndDialog
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
wsprintfA
MessageBoxA
kernel32
DosDateTimeToFileTime
GlobalLock
RtlUnwind
_lcreat
GetModuleHandleA
FindNextFileA
GetCommandLineA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
GetVersion
GetModuleFileNameA
SetErrorMode
GetTempPathA
GetTempFileNameA
CreateProcessA
WaitForSingleObject
GetTickCount
GetWindowsDirectoryA
OpenFile
LocalAlloc
GetCurrentDirectoryA
GlobalUnlock
GlobalHandle
LocalFree
LocalFileTimeToFileTime
GlobalAlloc
FindClose
FindFirstFileA
SetCurrentDirectoryA
lstrlenA
CreateDirectoryA
SetFileTime
_llseek
GlobalFree
lstrcpyA
_lopen
_lwrite
_lread
lstrcatA
_lclose
gdi32
SetTextColor
GetTextExtentPoint32A
GetBkColor
SetBkColor
ExtTextOutA
GetTextMetricsA
GetTextAlign
DeleteObject
TextOutA
SetTextAlign
SetBkMode
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
_winzip_ Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ