Static task
static1
Behavioral task
behavioral1
Sample
484956b3c72930bc2cc9e07857465cb90080a9670533a0a4dfaefbdc5cf447cf.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
484956b3c72930bc2cc9e07857465cb90080a9670533a0a4dfaefbdc5cf447cf.exe
Resource
win10v2004-20230703-en
General
-
Target
484956b3c72930bc2cc9e07857465cb90080a9670533a0a4dfaefbdc5cf447cf
-
Size
30KB
-
MD5
128c7cb93e014865bbc8bcdcd59ee95a
-
SHA1
db25c42757ed5f9d46923e3a1239018a20fcd69b
-
SHA256
484956b3c72930bc2cc9e07857465cb90080a9670533a0a4dfaefbdc5cf447cf
-
SHA512
3d879b04a14f8ca138482a2f89bf801f6de48014964d78eafc55bc6cd851db414cd200abfdedfbcfb23cb57ac29963d13086de88ea9030b81c1a460e8a7befff
-
SSDEEP
768:5Q3n4ZtMHykJk+1ALBCGgF2NuC9IuSLe:svYB1gsNdIuo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 484956b3c72930bc2cc9e07857465cb90080a9670533a0a4dfaefbdc5cf447cf
Files
-
484956b3c72930bc2cc9e07857465cb90080a9670533a0a4dfaefbdc5cf447cf.exe windows x86
133920d15d1c227166476a5c577a7a63
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
gdi32
GetTextMetricsA
SelectObject
ExtTextOutA
kernel32
GetFileTime
GetModuleFileNameA
FileTimeToSystemTime
GetDateFormatA
CloseHandle
OpenFile
DeleteCriticalSection
WaitForSingleObject
GetProcAddress
LoadLibraryA
EnterCriticalSection
GetFileSize
GetLocaleInfoA
lstrcatA
GetEnvironmentVariableA
GetSystemDirectoryA
lstrcmpiA
GlobalLock
GlobalReAlloc
GlobalFlags
GlobalUnlock
GlobalAlloc
GlobalFree
lstrlenA
lstrcpyA
FreeLibrary
InitializeCriticalSection
CreateEventA
SetEvent
LeaveCriticalSection
GetStartupInfoA
GetModuleHandleA
user32
GetClientRect
GetParent
MapWindowPoints
EnumChildWindows
SetDlgItemTextA
SendDlgItemMessageA
CheckDlgButton
InflateRect
GetClassNameA
SetWindowPos
RemovePropA
CallWindowProcA
BringWindowToTop
MoveWindow
DestroyWindow
MessageBeep
GetPropA
GetKeyState
ShowWindow
SetPropA
GetWindowTextA
PostQuitMessage
PostMessageA
SendMessageA
LoadCursorA
DefWindowProcA
LoadIconA
GetMessageA
RegisterClassA
CreateDialogParamA
DispatchMessageA
IsDialogMessageA
TranslateMessage
GetDC
GetWindowLongA
SetWindowLongA
EndDialog
ReleaseDC
CopyRect
IsDlgButtonChecked
GetDlgItem
EnableWindow
SetFocus
LoadStringA
wsprintfA
GetDlgItemTextA
MessageBoxA
DialogBoxParamA
UpdateWindow
msvcrt
_strrev
_strupr
strcpy
strcmp
_controlfp
_except_handler3
__p__fmode
__p__commode
__set_app_type
__setusermatherr
_initterm
_adjust_fdiv
_acmdln
exit
__getmainargs
_exit
memmove
_XcptFilter
strncmp
memcpy
_strnicmp
_findclose
_findnext
_findfirst
malloc
_beginthread
_endthread
memset
strtok
strcat
strlen
_strlwr
_stricmp
free
strstr
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegEnumValueA
RegDeleteValueA
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE