Static task
static1
Behavioral task
behavioral1
Sample
5c2ab349bff2012fc64be9e71010c9852250e3b8aa5b71229a6e30e7e1ba8dc2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
5c2ab349bff2012fc64be9e71010c9852250e3b8aa5b71229a6e30e7e1ba8dc2.exe
Resource
win11-20240611-en
General
-
Target
5c2ab349bff2012fc64be9e71010c9852250e3b8aa5b71229a6e30e7e1ba8dc2
-
Size
218KB
-
MD5
d80bb65fe6aa18cc152a957eec8acfaa
-
SHA1
b7fe6c68644aa5ec7641fa0c15dd9f5a00c9869b
-
SHA256
5c2ab349bff2012fc64be9e71010c9852250e3b8aa5b71229a6e30e7e1ba8dc2
-
SHA512
ead0b903092a722606fc08d7e05e210ae6d3003bb4c794ec2dd89164a7369df890c99bded1dcec50fd61059ad7ee96bdaae863a4fa1e1820901f90f0b4d4bb39
-
SSDEEP
3072:ZswtCW600rB9asH0JW3TGSg/+ranKc2y3EyBTftiACq2A9m1eiX2B9q:ZDCW0B99Hb37c2eBDtzJ2Gql0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5c2ab349bff2012fc64be9e71010c9852250e3b8aa5b71229a6e30e7e1ba8dc2
Files
-
5c2ab349bff2012fc64be9e71010c9852250e3b8aa5b71229a6e30e7e1ba8dc2.exe windows:5 windows x86 arch:x86
925a6885fb20a487f296461e9b8f5f0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadStringPtrW
TlsGetValue
SetEndOfFile
OpenJobObjectA
CreateDirectoryW
InterlockedCompareExchange
CreateHardLinkA
GetSystemDefaultLCID
GetWindowsDirectoryA
EnumResourceTypesA
GlobalFindAtomA
LoadLibraryW
GetConsoleAliasW
IsBadWritePtr
SetLastError
GetProcAddress
FindResourceA
LoadLibraryA
LocalAlloc
FindFirstVolumeMountPointW
GlobalHandle
GetOEMCP
LoadLibraryExA
OpenFileMappingA
SetFileAttributesW
CommConfigDialogW
SetStdHandle
WriteConsoleW
GetComputerNameA
GetDiskFreeSpaceW
GetSystemDefaultLangID
MultiByteToWideChar
DecodePointer
EncodePointer
GetLastError
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
LCMapStringW
GetStringTypeW
RtlUnwind
HeapSize
RaiseException
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
CreateFileW
user32
GetCaretPos
CloseWindow
SetMessageExtraInfo
GetKeyboardLayoutNameA
DdeCmpStringHandles
advapi32
ClearEventLogA
BackupEventLogW
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ