Static task
static1
Behavioral task
behavioral1
Sample
5654bf2dafae03ceeccbf01ba03ca1e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5654bf2dafae03ceeccbf01ba03ca1e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
5654bf2dafae03ceeccbf01ba03ca1e0N.exe
-
Size
280KB
-
MD5
5654bf2dafae03ceeccbf01ba03ca1e0
-
SHA1
ccc71aa79c2d4a6f405038ddde683a375c9daffa
-
SHA256
a5ed2f7a75bf7cb6f1b3d6aa10ce37edffae121a1aacf2e9cdff54b62f645358
-
SHA512
2801615e09c0b50173b42f1a6787ee1e4c15d0041a8f1ce8fa9f29f0018f805a1b343e756fa67394036d043d58d8f39e2328f113bf3034a70275b225a7dc8c38
-
SSDEEP
6144:IXR1aW67hlSYOHleyAqfGw3V9TTFdUxcqgpYVwCNyPpcKuOCq0a:IzaW67bShHu09n2vuCEPuO7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5654bf2dafae03ceeccbf01ba03ca1e0N.exe
Files
-
5654bf2dafae03ceeccbf01ba03ca1e0N.exe.exe windows:4 windows x86 arch:x86
3293cdedd98b289eba0d1c0bbe39e6c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
FreeLibrary
SetEnvironmentVariableA
EnumSystemLocalesA
RtlUnwind
HeapSize
EnterCriticalSection
GetCurrentProcess
GetTimeZoneInformation
VirtualAlloc
Sleep
MultiByteToWideChar
HeapReAlloc
GetStdHandle
ReadConsoleA
GetStartupInfoA
GetDateFormatA
SetLastError
GetModuleFileNameA
GetEnvironmentStringsW
HeapDestroy
ExitProcess
GetLocaleInfoA
HeapCreate
InterlockedIncrement
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetCurrentThread
IsValidLocale
QueryPerformanceCounter
SetUnhandledExceptionFilter
TlsSetValue
CompareStringA
TlsGetValue
WriteFile
GetCommandLineA
HeapAlloc
GetStringTypeW
HeapFree
GetDriveTypeW
TlsAlloc
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSection
GetVersionExA
VirtualFree
IsValidCodePage
GetCPInfo
GetLocaleInfoW
InterlockedDecrement
GetEnvironmentStrings
LeaveCriticalSection
UnhandledExceptionFilter
lstrcatA
FreeEnvironmentStringsA
GetModuleHandleA
GetProcessHeap
GetLastError
CompareStringW
FindResourceW
TlsFree
GetLongPathNameA
OpenFile
GetACP
IsDebuggerPresent
GetProcAddress
GetOEMCP
GetStringTypeA
FreeEnvironmentStringsW
SetConsoleCtrlHandler
InterlockedExchange
LCMapStringA
TerminateProcess
GetTimeFormatA
VirtualQuery
LCMapStringW
WideCharToMultiByte
CreateFileA
SetHandleCount
GetCurrentThreadId
user32
NotifyWinEvent
ExcludeUpdateRgn
SetWindowTextW
SystemParametersInfoA
GetKeyState
DdeNameService
UnregisterClassA
GetParent
OemToCharBuffA
FrameRect
ClipCursor
DdeInitializeW
IsCharAlphaNumericW
ArrangeIconicWindows
EndPaint
InflateRect
GetKeyNameTextA
advapi32
RegCreateKeyExA
CryptDuplicateKey
LookupPrivilegeNameW
RegDeleteValueA
CryptDeriveKey
ReportEventW
CryptExportKey
ReportEventA
GetUserNameA
LookupPrivilegeDisplayNameW
DuplicateToken
CryptEnumProviderTypesA
CryptSetKeyParam
RegCreateKeyW
RegEnumKeyA
RegQueryValueW
GetUserNameW
RegQueryMultipleValuesW
CryptGenKey
LookupAccountSidW
RegReplaceKeyW
CreateServiceW
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ