Static task
static1
Behavioral task
behavioral1
Sample
5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe
Resource
win10v2004-20240709-en
General
-
Target
5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe
-
Size
316KB
-
MD5
b9b3965d1b218c63cd317ac33edcb942
-
SHA1
02408bb6dc1f3605a7d3f9bad687a858ec147896
-
SHA256
5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9
-
SHA512
18096b1167561c6da5bfcc05e40f7661e21f43521eb47da9520d2744c8a1806d7187894ce0ae8e0a9e97904b345daae09897d80e8754a63c9aa1d6514feaf98e
-
SSDEEP
6144:xHQFwJYDzVc1aWLn0IU4eFTE3Ijr2Cq6j7+qmOq:Z6wWcYWL0IUzNGqJq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe
Files
-
5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe.exe windows:4 windows x86 arch:x86
33e2b97a6668118b8ed6f558d28a4a77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetVersionExA
FindClose
GetCurrentDirectoryA
GetFileSizeEx
FindNextFileA
FindFirstFileA
SizeofResource
LockResource
LoadResource
FindResourceA
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
WideCharToMultiByte
FileTimeToSystemTime
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GetSystemTime
GetLastError
HeapFree
IsBadReadPtr
VirtualProtect
GetProcessHeap
GlobalAlloc
GlobalFree
WriteFile
SetFileTime
GetFileAttributesA
CreateDirectoryA
GetModuleFileNameA
LocalFileTimeToFileTime
HeapAlloc
SetLastError
FreeLibrary
GetProcAddress
LoadLibraryA
VirtualFree
VirtualAlloc
GetEnvironmentVariableA
GetModuleHandleA
user32
PeekMessageA
EnableWindow
IsWindowEnabled
DrawTextA
BeginPaint
wsprintfA
DestroyWindow
GetWindowLongA
CreateWindowExA
EndPaint
ReleaseDC
GetDC
FindWindowA
DispatchMessageA
TranslateMessage
gdi32
CreateCompatibleBitmap
CreateBitmap
CreateCompatibleDC
DeleteDC
ArcTo
LineTo
Polyline
Arc
MoveToEx
AngleArc
GetObjectA
advapi32
CryptAcquireContextA
CryptImportKey
CryptReleaseContext
CryptDestroyKey
CryptDecrypt
ws2_32
inet_addr
WSAStartup
WSACleanup
msvcrt
fclose
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
strrchr
__p___argc
__p___argv
sscanf
abs
strlen
sprintf
memcpy
memset
__CxxFrameHandler
realloc
_stricmp
free
malloc
??3@YAXPAX@Z
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
_CxxThrowException
strcmp
wcslen
rand
calloc
??2@YAPAXI@Z
strcat
strcpy
_mbsstr
fread
fopen
labs
memcmp
_except_handler3
_local_unwind2
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ