Static task
static1
Behavioral task
behavioral1
Sample
5b0b782d531ab420972e3d3cc660c240N.exe
Resource
win7-20240704-en
General
-
Target
5b0b782d531ab420972e3d3cc660c240N.exe
-
Size
2.4MB
-
MD5
5b0b782d531ab420972e3d3cc660c240
-
SHA1
020a8e25618c9cdcda5bc2192ce262c4cada7c0f
-
SHA256
53fabb55f235df77c4993756474f017de76df9603a677c1b4cc2e83b59b91295
-
SHA512
1177ea57b4e9b298fd07f88e16d775b415f40a796f52f66c3f2b38ae5a4e9b0c18244648f833d85b9f4442364239fb74c49ea8cb2844ada50d99f7038f18fcca
-
SSDEEP
49152:l+jEQGeqS+JB3q7GC1+X6Lfl4BGp2bVhLp2CoTsQrb:lHeqS+87LxO7LptIrb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b0b782d531ab420972e3d3cc660c240N.exe
Files
-
5b0b782d531ab420972e3d3cc660c240N.exe.exe windows:4 windows x86 arch:x86
a0b36d31aba77d7cacfa586a4d9cac4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
lstrcmpiA
lstrcatA
lstrcpyA
WaitForSingleObject
WinExec
OpenFile
_lclose
GetFileAttributesA
_lwrite
GetTimeZoneInformation
_lread
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
GetFullPathNameA
CreateDirectoryA
GetLastError
SetVolumeLabelA
GetFileSize
GetVolumeInformationA
SetFilePointer
SetStdHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
lstrlenA
FlushFileBuffers
GetCurrentProcess
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapReAlloc
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
HeapDestroy
ExitProcess
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentDirectoryA
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetSystemTime
HeapFree
HeapAlloc
GetVersion
LoadLibraryA
GetProcAddress
CompareFileTime
SetFileAttributesA
CopyFileA
GetTempPathA
DeleteFileA
SetCurrentDirectoryA
RemoveDirectoryA
ReadFile
_llseek
GetVersionExA
GetDriveTypeA
FindFirstFileA
FindNextFileA
FindClose
VirtualAlloc
VirtualFree
Sleep
GetModuleFileNameA
CreateFileA
CloseHandle
GetWindowsDirectoryA
WriteFile
GetSystemDirectoryA
user32
SetActiveWindow
DestroyWindow
EnableWindow
SetWindowPos
EnumWindows
LoadBitmapA
LoadCursorA
OemToCharA
ShowWindow
GetMessageA
IsDialogMessageA
GetDlgItem
GetDlgCtrlID
EnableMenuItem
KillTimer
SetTimer
GetWindowTextA
PostMessageA
SetFocus
CreateWindowExA
SetCursor
GetParent
AdjustWindowRectEx
DrawFocusRect
DdeInitializeA
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeCreateDataHandle
DdeClientTransaction
DdeGetLastError
DdeFreeStringHandle
DdeDisconnect
DdeUninitialize
UnregisterClassA
GetClassInfoA
RegisterClassA
MessageBeep
GetWindowLongA
SetWindowLongA
DefWindowProcA
SetWindowWord
GetClientRect
InvalidateRect
UpdateWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
GetDC
ScreenToClient
GetSysColor
FrameRect
ReleaseDC
MoveWindow
GetWindowWord
SetWindowTextA
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
DestroyIcon
DestroyCursor
GetDesktopWindow
GetWindowRect
LoadIconA
PostQuitMessage
gdi32
SelectObject
CreateCompatibleDC
SetTextColor
SetBkColor
BitBlt
GetStockObject
SetBkMode
TextOutA
CreateSolidBrush
GetTextExtentPoint32A
DeleteObject
MoveToEx
LineTo
CreatePen
GetTextMetricsA
CreateFontIndirectA
DeleteDC
EnumFontFamiliesA
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueA
RegCreateKeyA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
FindExecutableA
ole32
CoTaskMemFree
mpr
WNetGetConnectionA
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE