Static task
static1
Behavioral task
behavioral1
Sample
4d89b4ddb21f84c9bab3d9b2e157991004161ce76e6e20a4df020fefa7fd618e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4d89b4ddb21f84c9bab3d9b2e157991004161ce76e6e20a4df020fefa7fd618e.exe
Resource
win10v2004-20230220-en
General
-
Target
4d89b4ddb21f84c9bab3d9b2e157991004161ce76e6e20a4df020fefa7fd618e
-
Size
132KB
-
MD5
cf29174492d271acf2e33e96ae2da0cb
-
SHA1
cbd534570824a84ed3de8d390bd93b077b1358cf
-
SHA256
4d89b4ddb21f84c9bab3d9b2e157991004161ce76e6e20a4df020fefa7fd618e
-
SHA512
e665ce60336816feb3f9a55a51b351a61a59748df9a3f2165e032ad7b93a6fe683b2312730436bd004acdaab62a6192333ab512be2a4bf43509cdefd6e5c1214
-
SSDEEP
3072:lGqLQblhZ+RFltoc6PoK8xkJ0VYCEeMBd/w/d:lfLQbERDtuTiVGeM/kd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d89b4ddb21f84c9bab3d9b2e157991004161ce76e6e20a4df020fefa7fd618e
Files
-
4d89b4ddb21f84c9bab3d9b2e157991004161ce76e6e20a4df020fefa7fd618e.exe windows x86
37817f6eea80ab33480f9b2fe404de53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
GetFileSize
CreateFileW
LeaveCriticalSection
OutputDebugStringW
EnterCriticalSection
FlushFileBuffers
DeleteCriticalSection
SetFilePointer
TerminateProcess
WaitForSingleObject
CreateProcessW
GetExitCodeProcess
SuspendThread
ResumeThread
lstrlenA
WriteFile
WideCharToMultiByte
GetCurrentProcess
FreeLibrary
HeapReAlloc
GetProcAddress
LoadLibraryW
LocalFree
LocalAlloc
ReadProcessMemory
OpenProcess
GetComputerNameW
FindFirstFileW
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
SetStdHandle
GetCPInfo
GetDriveTypeA
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
HeapFree
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileAttributesW
lstrcatW
DeleteFileW
MoveFileExW
lstrlenW
GetWindowsDirectoryW
lstrcmpiW
GetSystemDirectoryW
RemoveDirectoryW
lstrcpyW
FindNextFileW
InitializeCriticalSection
GetLastError
SetLastError
FindClose
GetModuleFileNameW
lstrcpynW
GetVersionExA
CreateThread
HeapAlloc
FindResourceW
LoadResource
LockResource
GetExitCodeThread
Sleep
GetVersion
GetCommandLineA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetFileType
CloseHandle
GetProcessHeap
RtlUnwind
GetFullPathNameW
InterlockedDecrement
InterlockedIncrement
RaiseException
GetLocalTime
GetModuleHandleA
GetStartupInfoA
TlsGetValue
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetUnhandledExceptionFilter
SetHandleCount
GetCurrentDirectoryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
MessageBoxA
SetWindowTextW
LoadStringW
ExitWindowsEx
EndDialog
DialogBoxParamW
WaitForInputIdle
MsgWaitForMultipleObjects
PeekMessageW
wsprintfW
SetForegroundWindow
GetWindowRect
GetSystemMetrics
SetWindowPos
DestroyWindow
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
SystemParametersInfoW
GetDlgItem
DefWindowProcW
SendMessageW
ShowWindow
UpdateWindow
LoadIconW
LoadCursorW
RegisterClassExW
CreateDialogParamW
LoadStringA
MessageBoxW
gdi32
CreateFontIndirectW
DeleteObject
advapi32
CloseServiceHandle
RegOpenKeyExW
EnumDependentServicesW
StartServiceW
OpenServiceW
ControlService
DeleteService
QueryServiceStatus
OpenSCManagerW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyW
shell32
SHChangeNotify
ole32
CoInitialize
CoUninitialize
comctl32
InitCommonControlsEx
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kfdiszg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE