Static task
static1
Behavioral task
behavioral1
Sample
4b78f1cbec028a02305966b5a88b5491500a52e18f997c52f872446470934bb1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4b78f1cbec028a02305966b5a88b5491500a52e18f997c52f872446470934bb1.exe
Resource
win10v2004-20230915-en
General
-
Target
4b78f1cbec028a02305966b5a88b5491500a52e18f997c52f872446470934bb1
-
Size
2.1MB
-
MD5
f178783301baffbc8fd8c329885c779a
-
SHA1
d4e702b385b274aeeea5eaaa5d231a6a6e6edd03
-
SHA256
4b78f1cbec028a02305966b5a88b5491500a52e18f997c52f872446470934bb1
-
SHA512
9c8cb219e5ba777ba97910af3ee27f65614b18b4887edf4cb82bc86ba094808318e0b8d22dfcda9097c61e6306c6c46d546b8e7441e00d6c8d8c6ac532d9195c
-
SSDEEP
49152:4amxCtU+WVenEtCp6KyuwlC79+bbeEWs77BCTsX+TYnV:Kx3sn6q6KyqE19f/SYV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b78f1cbec028a02305966b5a88b5491500a52e18f997c52f872446470934bb1
Files
-
4b78f1cbec028a02305966b5a88b5491500a52e18f997c52f872446470934bb1.exe windows:5 windows x86
ef22939fe53da4f0b3f5f815ff6986a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
advapi32
InitiateSystemShutdownA
GetLengthSid
GetTokenInformation
OpenProcessToken
AllocateAndInitializeSid
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
kernel32
SetFilePointer
FormatMessageA
LeaveCriticalSection
RemoveDirectoryA
GetLastError
DeleteFileA
MoveFileExA
EnterCriticalSection
TerminateProcess
SetEvent
Sleep
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
HeapAlloc
ReadFile
CreateFileA
ExitProcess
DeleteCriticalSection
FreeLibrary
FlushFileBuffers
GetSystemDirectoryA
GetVersionExA
GetProcAddress
LoadLibraryA
WaitForSingleObject
OpenEventA
WriteFile
GetCurrentProcess
CreateDirectoryA
GetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
CloseHandle
GetExitCodeProcess
CreateProcessA
GetCurrentDirectoryA
SystemTimeToFileTime
GetSystemTime
GetDiskFreeSpaceA
QueryDosDeviceA
GetDriveTypeA
CreateThread
CreateEventA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
InitializeCriticalSectionAndSpinCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
VirtualFree
HeapReAlloc
GetModuleHandleA
GetLocaleInfoA
GetCPInfo
SetStdHandle
RtlUnwind
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
HeapFree
DosDateTimeToFileTime
user32
SendDlgItemMessageA
DialogBoxParamA
MessageBoxA
SetParent
ShowWindow
SendMessageA
LoadStringA
EndDialog
ntdll
NtShutdownSystem
NtOpenProcessToken
NtClose
NtAdjustPrivilegesToken
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128.1MB - Virtual size: 128.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ