Static task
static1
Behavioral task
behavioral1
Sample
48147b50848419db945c84e8362389a949b8fee56fa0915c6d9c5842b26ae8f3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
48147b50848419db945c84e8362389a949b8fee56fa0915c6d9c5842b26ae8f3.exe
Resource
win10v2004-20230915-en
General
-
Target
48147b50848419db945c84e8362389a949b8fee56fa0915c6d9c5842b26ae8f3
-
Size
201KB
-
MD5
17d5693a954ddf3b7b50752d1e8bafe7
-
SHA1
c83d00ff0311debcd1255f78843f2860bfd766b7
-
SHA256
48147b50848419db945c84e8362389a949b8fee56fa0915c6d9c5842b26ae8f3
-
SHA512
b82c45c8cd2a2be2fc32d558873b962d4835b08a0e4f1b9869cb4566328f34573484de4fbf084ef4d0e4e4c09b728c072967a913dd3979e00f29061777e4bb91
-
SSDEEP
3072:scb9+h0MyD+AuVjMJMI/Xx/HWwxOXyVVNw:scg2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48147b50848419db945c84e8362389a949b8fee56fa0915c6d9c5842b26ae8f3
Files
-
48147b50848419db945c84e8362389a949b8fee56fa0915c6d9c5842b26ae8f3.exe windows:5 windows x64
327800b881c4ddded1604e31772c82fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
LoadStringW
SendDlgItemMessageW
SendMessageW
SetWindowPos
wsprintfW
ShowWindow
SetWindowTextW
LoadImageW
LoadIconW
GetSystemMetrics
EndDialog
DialogBoxParamW
DestroyWindow
DestroyIcon
DefWindowProcW
CreateDialogParamW
BringWindowToTop
SetDlgItemInt
EnableWindow
GetDlgItem
advapi32
RegCloseKey
EnumServicesStatusExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
CloseServiceHandle
QueryServiceConfig2W
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
comctl32
InitCommonControlsEx
shell32
SHGetSpecialFolderPathW
shlwapi
PathAddBackslashW
msvcrt
__lconv_init
memset
wcscat
wcslen
wcscspn
fgetws
_wfopen
fclose
feof
wcscmp
wcscpy
swprintf
wcschr
_wcsnicmp
_wtoi
memcpy
malloc
__setusermatherr
_amsg_exit
__wgetmainargs
__set_app_type
exit
_cexit
_fpreset
_initterm
__winitenv
_wcmdln
signal
kernel32
GetStartupInfoW
LoadLibraryW
GetProcAddress
GetModuleHandleW
FreeLibrary
SetUnhandledExceptionFilter
CloseHandle
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
TlsGetValue
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
GetLongPathNameW
GetWindowsDirectoryW
CreateProcessW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ