Static task
static1
Behavioral task
behavioral1
Sample
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe
Resource
win10v2004-20241007-en
General
-
Target
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N
-
Size
19KB
-
MD5
d8bf1ef88a3bd758d7ae78f791b24b40
-
SHA1
303c9fd3ed61e3730e0eb065ad06e1f3c8ac2d69
-
SHA256
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120
-
SHA512
50ef7ef38071ce6f1139fdef754c17b464733666a57bdec48233d182935561f60e9b758fb22f75ea6d840eb09a434e09529c0314c98e28f47c9b1da959f6e9e7
-
SSDEEP
384:qfRJYAySsaRbAEJb/0rZRwZBgs3CVyu850fEvkjzJYFK:qfRygBbJj0dRwzgvysfjEK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N
Files
-
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe windows:5 windows x86 arch:x86
0c04f28339acdd43cd6fb9855519e957
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkMode
SetBrushOrgEx
SetMapMode
SetMetaFileBitsEx
SetPixel
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocW
StartPage
StretchBlt
StretchDIBits
kernel32
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
PulseEvent
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
ExitProcess
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeConsole
GetACP
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFullPathNameW
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcessHeap
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GetVersionExW
HeapAlloc
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidCodePage
IsValidLocale
pdh
PdhValidatePathA
user32
CreateAcceleratorTableW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleW
DdeDisconnect
GetMessageA
LoadIconA
RegisterClassA
Sections
.text Size: 512B - Virtual size: 35B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ