Static task
static1
Behavioral task
behavioral1
Sample
4c2e515133a15248b8abd558c58974b3299c79b1f932c57e8fe3cb2d3d09982f.exe
Resource
win10-20230220-en
General
-
Target
4c2e515133a15248b8abd558c58974b3299c79b1f932c57e8fe3cb2d3d09982f
-
Size
381KB
-
MD5
f086faa85a031e43e95537a88fa6aba5
-
SHA1
70b3dde63fd9046b28fee1c5edce1cb75e847382
-
SHA256
4c2e515133a15248b8abd558c58974b3299c79b1f932c57e8fe3cb2d3d09982f
-
SHA512
abf7bc9c955806cc88c61c8a397e68a6b133067fa0dbecdc9d259a1f5f9c39ebe50a01974c4f64a4457916a2c4323c509aedb54923e48fe12274acd7a7b901d8
-
SSDEEP
6144:gcR6sEkGGBY5cuCSfaK9Pdpsm/ws6J4Xpjt0:nosEkGcSdxxwszz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4c2e515133a15248b8abd558c58974b3299c79b1f932c57e8fe3cb2d3d09982f
Files
-
4c2e515133a15248b8abd558c58974b3299c79b1f932c57e8fe3cb2d3d09982f.exe windows x86
990c89c433da3b7d64f353fa72e0bf82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GetModuleHandleW
EnumCalendarInfoExW
GetNumberFormatA
EnumTimeFormatsA
CreateActCtxW
SetProcessPriorityBoost
ActivateActCtx
FindResourceExA
GetCalendarInfoW
GetSystemWindowsDirectoryA
EnumSystemCodePagesA
FindNextVolumeW
GetConsoleAliasW
Beep
GetConsoleFontSize
lstrlenW
GlobalUnlock
GetShortPathNameA
EnumSystemLocalesA
GetCPInfoExW
SetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
HeapSize
IsBadHugeWritePtr
AddConsoleAliasW
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
RemoveDirectoryW
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
GetDefaultCommConfigA
SetConsoleCursorInfo
GetConsoleTitleW
GetDiskFreeSpaceExW
FindAtomW
GetWindowsDirectoryW
DeleteTimerQueueTimer
GetTempPathA
SuspendThread
CreateFileA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
SetStdHandle
FlushFileBuffers
GetModuleHandleA
SetComputerNameW
WaitForSingleObject
ReadConsoleA
GetCurrentActCtx
BeginUpdateResourceW
lstrlenA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
ExitProcess
GetCPInfo
GetACP
IsValidCodePage
SetHandleCount
GetStdHandle
GetFileType
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
SetFilePointer
GetConsoleCP
GetConsoleMode
user32
ToAsciiEx
ChangeMenuA
CharLowerBuffW
SetParent
CreateAcceleratorTableW
GetWindowLongW
GetSysColorBrush
GetKeyNameTextW
GetMenuInfo
gdi32
GetCharWidthA
GetCharABCWidthsW
CreateHalftonePalette
advapi32
BackupEventLogA
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ