Static task
static1
Behavioral task
behavioral1
Sample
5be8a2b6239a2579b8fff319e1382830N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5be8a2b6239a2579b8fff319e1382830N.exe
Resource
win10v2004-20240709-en
General
-
Target
5be8a2b6239a2579b8fff319e1382830N.exe
-
Size
1.2MB
-
MD5
5be8a2b6239a2579b8fff319e1382830
-
SHA1
a8805485a742b51009ae15bfbfa1bd5a760314a5
-
SHA256
bdc696b7349edad4ff7e02d4d53925b9eafe21c28611772e73fe98e4b2cc209c
-
SHA512
c8e7036ce03cdc5abe90b77d95d61f4284bd688616be237bfbbead59bfe3f968433e0455746b756ad64a7ea5534d2e6c08b2b3923166863772aba48809448d74
-
SSDEEP
12288:rCRO0sBcLEKCRO0sBcLEgCRO0sBcLEKCRO0sBcLEjCRO0sBcLEKCRO0sBcLEgCR3:2RBeRBCRBeRBrRBeRBCRBeRB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5be8a2b6239a2579b8fff319e1382830N.exe
Files
-
5be8a2b6239a2579b8fff319e1382830N.exe.exe windows:4 windows x86 arch:x86
7f2dcbc2321709700da018941988dcba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
GetPixel
SelectObject
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMailslotA
CreateProcessA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetDriveTypeA
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetSystemTime
GetTickCount
GetVersionExA
GlobalLock
GlobalMemoryStatus
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
OpenFile
OpenProcess
Process32First
Process32Next
ReadFile
ReleaseSemaphore
SetCurrentDirectoryA
SetFileAttributesA
SetFileTime
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
msvcrt
_mkdir
__getmainargs
__p___argc
__p___argv
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_findclose
_findfirst
_findnext
_iob
_onexit
_setmode
_splitpath
abort
atexit
atof
atoi
exit
fclose
fflush
fgetc
fopen
fprintf
fputc
fread
free
fscanf
fseek
ftell
fwrite
getenv
malloc
memmove
memset
rand
realloc
remove
signal
sprintf
srand
sscanf
strcat
strcmp
strcpy
strlen
strstr
time
shell32
ShellExecuteA
shlwapi
PathFileExistsA
user32
CallNextHookEx
CloseClipboard
DispatchMessageA
GetClipboardData
GetDC
GetDesktopWindow
GetKeyState
GetMessageA
GetWindowRect
MessageBoxA
OpenClipboard
ReleaseDC
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
wininet
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetGetConnectedState
InternetOpenA
InternetReadFile
winmm
mciSendCommandA
mciSendStringA
wsock32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
htons
listen
recv
send
socket
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE