Static task
static1
Behavioral task
behavioral1
Sample
5d37696feee100ac78d5221669f96b006c851f54c1f36f44fab2e6b71c6498b1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
5d37696feee100ac78d5221669f96b006c851f54c1f36f44fab2e6b71c6498b1.exe
Resource
win11-20240426-en
General
-
Target
5d37696feee100ac78d5221669f96b006c851f54c1f36f44fab2e6b71c6498b1
-
Size
888KB
-
MD5
8f0071027d513867feb3eb8943ccaf05
-
SHA1
084b7e9e001bcfd1f2ad8adb6f39d08e5aadae4b
-
SHA256
5d37696feee100ac78d5221669f96b006c851f54c1f36f44fab2e6b71c6498b1
-
SHA512
3770b07247625e99cf8156d065891c66300f28d6acb4d1288c32b5dd706a1d5c106649bc7f7722d90ff95fd9e769a74e5d3872b670396418e249a8a7ab17b7a2
-
SSDEEP
24576:nV7DG8x3qHixt9DklU7YRXoLuuTXHQBIf8l6sljAVlEt:1K8KixtusTLBTXHMH6yAVlG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d37696feee100ac78d5221669f96b006c851f54c1f36f44fab2e6b71c6498b1
Files
-
5d37696feee100ac78d5221669f96b006c851f54c1f36f44fab2e6b71c6498b1.exe windows:4 windows x86 arch:x86
33967a24a261bf787771766b0c0f449a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetTempPathA
GetModuleFileNameA
lstrlenA
MoveFileExA
GlobalMemoryStatus
GetModuleHandleA
GetStartupInfoA
WaitForSingleObject
GetSystemInfo
CreateThread
CreateProcessA
GetFileAttributesA
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
CloseHandle
ExitThread
Sleep
GetCurrentProcessId
CopyFileA
GetTickCount
user32
MessageBoxA
wsprintfA
advapi32
CreateServiceA
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
LockServiceDatabase
ws2_32
select
__WSAFDIsSet
recv
WSAIoctl
send
WSAStartup
WSASocketA
WSAGetLastError
setsockopt
htonl
sendto
WSACleanup
gethostbyname
socket
htons
connect
closesocket
inet_addr
msvcrt
strlen
strcat
_controlfp
__set_app_type
strcpy
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_iob
malloc
free
rand
sprintf
memset
printf
fprintf
memcpy
_except_handler3
_local_unwind2
strstr
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
strncmp
iphlpapi
GetIfTable
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SB360 Size: 844KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SB360 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ