Static task
static1
Behavioral task
behavioral1
Sample
4a862a6538e1812d1969572f922c630c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4a862a6538e1812d1969572f922c630c.exe
Resource
win10v2004-20230703-en
General
-
Target
4a862a6538e1812d1969572f922c630c.exe
-
Size
785KB
-
MD5
4a862a6538e1812d1969572f922c630c
-
SHA1
774e6ec451eb29f2b29699d8dc718fb69ff7ad0e
-
SHA256
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8
-
SHA512
5b9fec441456303b73524ed50bf0aa393d26d0f46362118fbb27c635bbce99af593b189fd16baea03fa60045ff7371b66606c266e37c390cdb4b227f6bdc7b2d
-
SSDEEP
12288:EFsCfLXwG5W8M5XiXRY9IszLRMyCErDc/yStGgRh6bF4h/T7Sui9k5m:EFsCjXwqU5yS9IszmK4/DawQcm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a862a6538e1812d1969572f922c630c.exe
Files
-
4a862a6538e1812d1969572f922c630c.exe.exe windows x64
30c7d46c36e7ac7e0d52b4514f420d27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetProcessHeap
CreateFileA
CloseHandle
GetLastError
GetCurrentDirectoryA
GetCurrentActCtx
HeapWalk
CreateThread
FindFirstFileA
FindNextFileA
ReadFile
GetFileInformationByHandle
SetEndOfFile
SetFilePointer
CreateFileMappingA
ExitProcess
VirtualAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
WriteConsoleW
HeapFree
GetModuleHandleW
GetProcAddress
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetACP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateFileW
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
FreeLibrary
LoadLibraryExW
LCMapStringW
IsValidCodePage
GetOEMCP
GetModuleHandleExW
RaiseException
RtlUnwindEx
SetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 446KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ