Static task
static1
Behavioral task
behavioral1
Sample
4bbf93a7b2382abff78f67110d2a4a043502aecfd8f80e0d2d48252133393a52.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4bbf93a7b2382abff78f67110d2a4a043502aecfd8f80e0d2d48252133393a52.exe
Resource
win10v2004-20230220-en
General
-
Target
4bbf93a7b2382abff78f67110d2a4a043502aecfd8f80e0d2d48252133393a52
-
Size
1.1MB
-
MD5
15c8d9c19a4583b2a06f54f5a7f016fa
-
SHA1
c9bbef18b35cad313010a1f8fd5510c985b0df6f
-
SHA256
4bbf93a7b2382abff78f67110d2a4a043502aecfd8f80e0d2d48252133393a52
-
SHA512
2f828a15b43a397bbfd11db8a4b75ad32d6ce65123e9c858a8da15e477c8ba08d06b8f8e13dbb5538679076240e019488f167278e5c3582393725775933fc13c
-
SSDEEP
24576:1S1Xq5oMxw1wkGbpn2nu8bJ3yPwSlE5ElsT0HOJSz5rEN8Rx:2VMx6J3yoSlE5ElsT0oSz5rEN8Rx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bbf93a7b2382abff78f67110d2a4a043502aecfd8f80e0d2d48252133393a52
Files
-
4bbf93a7b2382abff78f67110d2a4a043502aecfd8f80e0d2d48252133393a52.exe windows x86
3a32cdb269f08988a7a8538dbd6dbcb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetModuleFileNameW
CreateFileW
GetTempPathW
GetProcAddress
GetLocalTime
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
LoadLibraryExW
GetModuleHandleW
GetFileAttributesW
GetCommandLineW
FreeLibrary
SetUnhandledExceptionFilter
MoveFileExW
InitializeCriticalSectionAndSpinCount
RaiseException
GetLastError
MoveFileW
DecodePointer
lstrcatW
DeleteCriticalSection
DeleteFileW
LocalFree
CreateProcessW
lstrcmpiW
FindFirstFileW
FileTimeToSystemTime
FindClose
CreateMutexW
WaitForSingleObject
Sleep
ReleaseMutex
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetEnvironmentVariableW
ExpandEnvironmentStringsW
GetLongPathNameW
GetFileAttributesExW
GetExitCodeProcess
WaitForMultipleObjects
HeapAlloc
HeapFree
GetProcessHeap
OpenProcess
GetVersionExW
GetComputerNameExW
QueryDosDeviceW
GetFileSize
SetFilePointer
GetCurrentProcess
SetFileTime
WriteFile
ReadFile
GetFileTime
FindResourceW
LoadResource
LockResource
GetSystemInfo
GetFullPathNameW
GetTempFileNameW
CreateDirectoryW
lstrlenW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetFileAttributesW
FindNextFileW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileSizeEx
WideCharToMultiByte
GetACP
MultiByteToWideChar
SetEnvironmentVariableA
GetLogicalDriveStringsW
SetEvent
FormatMessageW
GlobalMemoryStatusEx
ResumeThread
ResetEvent
CreateEventW
InterlockedExchangeAdd
InterlockedExchange
SetLastError
DeviceIoControl
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
OutputDebugStringW
HeapReAlloc
GetTimeZoneInformation
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
SetStdHandle
WriteConsoleW
ReadConsoleW
SetEndOfFile
QueryPerformanceCounter
GetFileType
GetStdHandle
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetStringTypeW
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
CreateThread
ExitThread
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
user32
PostMessageW
IsWindow
MessageBoxW
wsprintfW
SendMessageTimeoutW
shell32
CommandLineToArgvW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFolderPathW
ole32
CoTaskMemFree
shlwapi
PathRemoveFileSpecW
Sections
.text Size: 903KB - Virtual size: 902KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ