Static task
static1
Behavioral task
behavioral1
Sample
4149a0c8a36de2781f8f9ea80d20ff7000e72fea05dfa7a6e18f12aa99254dd0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4149a0c8a36de2781f8f9ea80d20ff7000e72fea05dfa7a6e18f12aa99254dd0.exe
Resource
win10v2004-20230831-en
General
-
Target
4149a0c8a36de2781f8f9ea80d20ff7000e72fea05dfa7a6e18f12aa99254dd0
-
Size
79KB
-
MD5
4c6b97c680b805acc217820e7aa30c1b
-
SHA1
7be20afb1b31690c1dff4494257ba2653399916a
-
SHA256
4149a0c8a36de2781f8f9ea80d20ff7000e72fea05dfa7a6e18f12aa99254dd0
-
SHA512
d42c23f548369ac2fe000d0ffa2fa3bb73a12bb143a2b8b530528f4aa93cb307e4484125794dd49d2e2ccaf9f2d9cc59cd13dcb70548f9afdc67e7f8e7fc83e3
-
SSDEEP
768:eG3kTAD/Scd7914PB+rPvu1Z/JPBczPur29ia7wEqBAWzrrKYerrrrrrSo0YnV6o:sp47914TFBI0eRn0LOSVKlGxrW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4149a0c8a36de2781f8f9ea80d20ff7000e72fea05dfa7a6e18f12aa99254dd0
Files
-
4149a0c8a36de2781f8f9ea80d20ff7000e72fea05dfa7a6e18f12aa99254dd0.exe windows x64
404fbc15abba796982f1377a4dc7c4c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mfc90
ord265
ord266
ord776
ord3732
ord4689
ord4133
ord1444
ord362
ord316
ord798
ord1149
ord2722
ord2218
ord2562
ord6194
ord2954
ord6366
ord2970
ord5993
ord512
ord722
ord4861
ord1840
ord1938
ord5302
ord4313
ord4846
ord5003
ord1714
ord1713
ord1585
ord3131
ord6038
ord1433
ord4346
ord5323
ord4364
ord3265
ord617
ord6806
ord9354
ord2139
ord4340
ord11869
ord8517
ord8756
ord6533
ord3970
ord1080
ord602
ord1977
ord1517
ord4196
ord2136
ord1581
ord3133
ord6041
ord1662
ord1659
ord4039
ord1434
ord4336
ord5272
ord1954
ord5191
ord6406
ord4285
ord5334
ord3488
ord4833
ord4384
ord1636
ord6086
ord5355
ord5353
ord936
ord941
ord945
ord943
ord947
ord2455
ord2475
ord2459
ord2465
ord2461
ord2478
ord2473
ord2457
ord2480
ord2468
ord2450
ord2452
ord2470
ord2233
ord2226
ord1556
ord6410
ord3893
ord6408
ord3430
ord5083
ord6012
ord3011
ord1393
ord5295
ord2010
ord1699
ord1698
ord1635
ord5320
ord2932
ord3069
ord4591
ord3253
ord583
ord1103
ord589
ord310
ord3921
ord1071
ord2067
ord6938
ord12010
ord12800
ord9578
ord10063
ord9910
ord12742
ord11771
ord12223
ord7372
ord9571
ord778
ord4136
ord4112
ord6409
ord3892
ord6407
ord4429
ord2110
ord2065
ord5701
ord3897
ord1023
ord5220
ord6348
ord5499
ord3923
ord1966
ord3002
ord5344
ord5346
ord8058
ord4041
ord4677
ord5350
ord5333
ord5684
ord2602
ord2797
ord2904
ord4410
ord2780
ord2907
ord2605
ord2711
ord2598
ord3809
ord3810
ord3800
ord2709
ord4042
ord4586
ord4363
ord8878
ord6744
ord4648
ord3774
ord2463
ord1237
msvcr90
_setmbcp
__crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_cexit
_ismbblead
_exit
_XcptFilter
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__C_specific_handler
memcpy
vsprintf_s
_strupr
realloc
_CxxThrowException
vsprintf
sprintf
fprintf
malloc
fopen
fclose
free
strstr
_time64
_localtime64
memset
__CxxFrameHandler3
kernel32
lstrcpyA
LoadLibraryA
FreeLibrary
GetPrivateProfileSectionA
WritePrivateProfileSectionA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileIntA
Sleep
GetCurrentThreadId
lstrlenA
GetTickCount
GetStartupInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
LocalFree
TerminateProcess
GetTempPathA
FindFirstFileA
FindClose
WritePrivateProfileStringA
GetProcAddress
user32
IsIconic
SendMessageA
GetClientRect
wsprintfA
DrawIcon
GetSystemMetrics
LoadIconA
EnableWindow
LockWindowUpdate
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
oleaut32
VariantClear
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ