CeyEvent@12
Static task
static1
Behavioral task
behavioral1
Sample
5f4ec022b2d621a4826c7a320e5048d1c480a2daa97c292468a4b016a5c2cbadN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f4ec022b2d621a4826c7a320e5048d1c480a2daa97c292468a4b016a5c2cbadN.exe
Resource
win10v2004-20241007-en
General
-
Target
5f4ec022b2d621a4826c7a320e5048d1c480a2daa97c292468a4b016a5c2cbadN
-
Size
92KB
-
MD5
b09b1b2fd02ead4daaf02920f01f1ba0
-
SHA1
f3b98014d40233326e6929bf1339a268b7e4728e
-
SHA256
5f4ec022b2d621a4826c7a320e5048d1c480a2daa97c292468a4b016a5c2cbad
-
SHA512
7ffecbfa6dc274f22775a6bccfd8764e59f5aa35d0b5f9342a44f0b0d75280ae8db9a68db659e95402549b945daafaecdf5d0bb2461ce6516d2b9bab6693466a
-
SSDEEP
1536:6UMTIGU8vM3dG7l5rphVgEQF5NM4Jt78eRL2h+nhMJ41mx8k2:6bTIGbvM3dIhVYFU4JtVRqYnCJ41mu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f4ec022b2d621a4826c7a320e5048d1c480a2daa97c292468a4b016a5c2cbadN
Files
-
5f4ec022b2d621a4826c7a320e5048d1c480a2daa97c292468a4b016a5c2cbadN.exe windows:4 windows x86 arch:x86
ea28f662ab831803e9a8c823439760d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
_getcwd
_mkdir
_sleep
_stat
_strlwr
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_findclose
_findfirst
_findnext
_fullpath
_iob
_onexit
_setmode
abort
atexit
difftime
exit
fclose
fflush
fopen
fprintf
fputc
fread
free
fseek
fwrite
getenv
localtime
malloc
printf
rand
signal
srand
time
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
kernel32
AddAtomA
CloseHandle
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
GetAtomNameA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleHandleA
GetProcAddress
LoadLibraryA
Module32First
Process32First
Process32Next
SetFileAttributesA
SetUnhandledExceptionFilter
ntdll
atoi
atol
memcpy
memset
sprintf
strcat
strcpy
strlen
tolower
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetKeyNameTextA
GetMessageA
MessageBoxA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
ws2_32
WSACleanup
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
getaddrinfo
gethostbyname
gethostname
htons
listen
recv
select
send
socket
Exports
Exports
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ