Static task
static1
Behavioral task
behavioral1
Sample
5b181bc87e776a02249b8078f2885bbcc0b72be08fa5ecad27372e174cafe3c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b181bc87e776a02249b8078f2885bbcc0b72be08fa5ecad27372e174cafe3c7.exe
Resource
win10v2004-20241007-en
General
-
Target
5b181bc87e776a02249b8078f2885bbcc0b72be08fa5ecad27372e174cafe3c7
-
Size
72KB
-
MD5
bdbef8c14edefe58d05de2fa1237dc39
-
SHA1
62a936bc6b2639c24d3d9819a45f94034f78f480
-
SHA256
5b181bc87e776a02249b8078f2885bbcc0b72be08fa5ecad27372e174cafe3c7
-
SHA512
8618e72fca25fca11ec5dae9ce691398d0500ad478914189732f1fbbb3259f598ce71205b463019a7ea8fe532e774a9e3ecbf11aab8399e858206c13c7d0e5b3
-
SSDEEP
768:cDtdBHEaj9KjRXWBCJ5VhME/TcLPbWac0rvZwNvtfKiNfXioUyzUfWMdUr59Wv:WB5DBCJT/TSVjDfWXrfW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b181bc87e776a02249b8078f2885bbcc0b72be08fa5ecad27372e174cafe3c7
Files
-
5b181bc87e776a02249b8078f2885bbcc0b72be08fa5ecad27372e174cafe3c7.exe windows:5 windows x86 arch:x86
cae9861be4ba53d1f9d0552d8cecc4c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
kernel32
CloseHandle
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_ultow
_unlock
_vsnwprintf
_wcmdln
_wcsupr
_wtoi
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcslen
wcstoul
shell32
ShellExecuteExW
Shell_NotifyIconW
gdi32
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontW
DeleteDC
DeleteObject
ExtTextOutW
PatBlt
SelectObject
SetBkColor
SetTextColor
user32
AppendMenuW
CheckMenuItem
CreateIconIndirect
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyMenu
DispatchMessageW
DrawTextW
EnumWindows
GetCursorPos
GetDC
GetKeyboardLayout
GetMessageW
GetSubMenu
GetSysColor
GetWindowThreadProcessId
LoadKeyboardLayoutW
LoadMenuW
LoadStringW
MessageBoxW
PostMessageW
PostQuitMessage
RegisterClassW
RegisterShellHookWindow
RegisterWindowMessageW
ReleaseDC
SendMessageW
SetForegroundWindow
SetProcessDefaultLayout
TrackPopupMenu
TranslateMessage
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 26KB - Virtual size: 26KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ