Static task
static1
Behavioral task
behavioral1
Sample
c4d33fc79173be38c3a76223263f6b37486903188e3c081586ecd62fcc651497.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c4d33fc79173be38c3a76223263f6b37486903188e3c081586ecd62fcc651497.exe
Resource
win10v2004-20230220-en
General
-
Target
c4d33fc79173be38c3a76223263f6b37486903188e3c081586ecd62fcc651497
-
Size
684KB
-
MD5
07e322e00371943a3577322504276f9c
-
SHA1
492f80833aea121973be091e5634fd89d3ceb0d3
-
SHA256
c4d33fc79173be38c3a76223263f6b37486903188e3c081586ecd62fcc651497
-
SHA512
56155008c846382a8ddb8b814ce6208b10d69a4b340bcad7fd7d952b48ee913cafafe188ab76b6c4cbd3a7f2d065a99f4e464fd118832eb23917fe8bdded03bd
-
SSDEEP
12288:M2T7qAinDx1SYFfo7y7Uw/fsbDAOG4Vf7fjwO98DiWRWF6PHMx:MW7q722oO5fsfzrVTfsP9WFaH8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4d33fc79173be38c3a76223263f6b37486903188e3c081586ecd62fcc651497
Files
-
c4d33fc79173be38c3a76223263f6b37486903188e3c081586ecd62fcc651497.exe windows x86
Password: infected
26c7ad4b1eb72c303de700f3ac864e99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
_lwrite
GetLogicalDriveStringsW
WaitForSingleObject
AddConsoleAliasW
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesA
GetNumberFormatA
ReadConsoleW
GetConsoleAliasExesW
GetPriorityClass
GlobalAlloc
LoadLibraryW
GetCalendarInfoW
FreeConsole
FormatMessageW
GlobalFlags
FindNextVolumeW
CreateActCtxA
GetACP
GetLargestConsoleWindowSize
InterlockedExchange
SetCurrentDirectoryA
OpenMutexW
GetLocaleInfoA
GetCurrentDirectoryW
GetProcAddress
VirtualAlloc
IsValidCodePage
LoadLibraryA
WriteConsoleA
FindFirstVolumeMountPointW
SetConsoleCtrlHandler
FindAtomA
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
CreateMutexA
RequestWakeupLatency
VirtualProtect
GetCurrentThreadId
GetVersionExA
FileTimeToLocalFileTime
GetCurrentProcessId
AddConsoleAliasA
ReadConsoleOutputCharacterW
OpenFileMappingA
CommConfigDialogW
ReadFile
CreateTimerQueue
WritePrivateProfileStructA
GetDateFormatW
GetLastError
LocalUnlock
GetProcessHeap
SetEndOfFile
FlushFileBuffers
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
WideCharToMultiByte
SetHandleCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapCreate
HeapAlloc
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
RtlUnwind
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
CloseHandle
CreateFileA
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetCaretPos
LoadMenuW
CharUpperBuffW
gdi32
GetCharacterPlacementW
advapi32
MapGenericMask
ReportEventW
ole32
ReadClassStg
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 636KB - Virtual size: 636KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ