Static task
static1
Behavioral task
behavioral1
Sample
4AD9.tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4AD9.tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
4AD9.tmp.exe
-
Size
224KB
-
MD5
46c555e1f356b81323120967141c71aa
-
SHA1
591e8609dbf7a93ac60785b77728eed67f6a9606
-
SHA256
1fd76dbda2ed4a1392326b08e706d4b339bff5cf69b4cfd706a10a15fb4753cb
-
SHA512
3a558ed387009dc334831b7423fb53dbdcfb577181a4155792d049a602cad6fc0b9da56e1abd2d56eb9ebd34a6eecd6d90dbaaabe4cc28625eb2ef073e24bf99
-
SSDEEP
1536:WPIAGF7x5VZf8NCxIePD/5bPdXDhJlIxbTILICbpDUq68nmFL3dYQDKbsYCF+L:zDbBf/5JFJuxnILIIpDUqFnkL3aSU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4AD9.tmp.exe
Files
-
4AD9.tmp.exe.exe windows x86
77912b10e01a49ea3bd0881c3ebc6aa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
EnumTimeFormatsW
FindAtomW
GetProcAddress
SetMailslotInfo
GetThreadSelectorEntry
GetCPInfo
LoadLibraryW
lstrcpyA
WriteConsoleOutputCharacterW
LocalAlloc
GetExitCodeThread
TerminateThread
TerminateProcess
FindFirstChangeNotificationW
GetLastError
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FindCloseChangeNotification
GetCurrentDirectoryW
SetLastError
HeapFree
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
ReadFile
RtlUnwind
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
CloseHandle
CreateFileA
LoadLibraryA
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetEndOfFile
GetProcessHeap
HeapSize
GetLocaleInfoA
user32
PeekMessageW
GetDialogBaseUnits
LoadCursorFromFileW
LoadImageA
LoadStringA
UpdateWindow
CreateWindowExA
LoadIconA
LookupIconIdFromDirectoryEx
GetNextDlgGroupItem
GetMonitorInfoW
GetUpdateRect
SetParent
SetThreadDesktop
gdi32
CreateCompatibleDC
SetViewportOrgEx
CreateCompatibleBitmap
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ