Static task
static1
Behavioral task
behavioral1
Sample
c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03.exe
Resource
win10v2004-20240709-en
General
-
Target
c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03
-
Size
234KB
-
MD5
61867a71161ae87b02413bad06e53446
-
SHA1
eb375d9b4b9089457e0b480f12d977ceb1655b07
-
SHA256
c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03
-
SHA512
43e7cfb44fd61e9182fddeab13add5cd6e6cb8ce3e5c7a728daecdf2bb6bc3f157c7c1ab666ae3bf5fb191341b5b43f9e3a4a9d98936b9881c4fc3c1b0be30bd
-
SSDEEP
3072:jYnp0HalR5aEr0AZsLjhR7OcPlnr2YWwtq+BkkWMV:jYnp5G+fZsLjhRSilhzjOc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03
Files
-
c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03.exe windows:5 windows x86 arch:x86
939bb23ece53cd668e699322eee9e90a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
EnumResourceTypesA
GlobalAlloc
LoadLibraryW
AssignProcessToJobObject
IsBadWritePtr
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
IsBadHugeWritePtr
VerLanguageNameA
CreateJobSet
SetConsoleCtrlHandler
CreateEventW
AddAtomA
GlobalHandle
Module32FirstW
GetModuleFileNameA
GetOEMCP
HeapSetInformation
GetFileTime
GetCurrentThreadId
GetDiskFreeSpaceExA
ReadConsoleInputW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineW
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
ReadFile
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
user32
CharUpperBuffA
SetCursorPos
SetCaretPos
GetCaretBlinkTime
GetMessageTime
ChangeMenuW
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 28.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wajuf Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tefi Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ