Static task
static1
Behavioral task
behavioral1
Sample
482a61c4cf05b7041690347931724069ec85f3b993763c84c9b368c6f4544651.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
482a61c4cf05b7041690347931724069ec85f3b993763c84c9b368c6f4544651.exe
Resource
win10v2004-20231020-en
General
-
Target
482a61c4cf05b7041690347931724069ec85f3b993763c84c9b368c6f4544651
-
Size
241KB
-
MD5
cd166b540a02dad329ee3c5bfa95c7c7
-
SHA1
4b4899d7b3712990dd45487bd95be410c979b80b
-
SHA256
482a61c4cf05b7041690347931724069ec85f3b993763c84c9b368c6f4544651
-
SHA512
1945dc8b67a79703ff05becf6fe1ccdea9d6704f0e4f5ed159114e9c7555e27d86481d5877fd090cc6fda29cd0b566d7042cea27f3ead8ed6d3d57e1501a82ba
-
SSDEEP
6144:b8VmAj5S4QD2perTdc7kwjYyTlJ2A7xd4t4rb4Y6mzymY5ZqHzEcd+8f3KxdSSmv:gVzAUdEW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 482a61c4cf05b7041690347931724069ec85f3b993763c84c9b368c6f4544651
Files
-
482a61c4cf05b7041690347931724069ec85f3b993763c84c9b368c6f4544651.exe windows:5 windows x86
120e7a49e2c84485fab26e24138a2ec5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
kernel32
InitializeCriticalSection
DeleteCriticalSection
CreateProcessW
CloseHandle
OpenProcess
EnterCriticalSection
Sleep
LeaveCriticalSection
CreateFileW
ReadFile
GetModuleHandleW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
user32
wsprintfW
SetFocus
PostQuitMessage
GetSubMenu
TrackPopupMenu
SetForegroundWindow
GetCursorPos
DestroyWindow
DefWindowProcW
IsWindowVisible
UpdateWindow
RegisterDeviceNotificationW
LoadMenuW
RegisterWindowMessageA
RegisterClassExW
LoadCursorW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
LoadIconW
ShowWindow
CreateWindowExW
advapi32
RegCloseKey
RegQueryValueW
RegQueryInfoKeyW
RegOpenKeyExW
shell32
Shell_NotifyIconW
SHGetSpecialFolderPathW
msvcr100
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
_controlfp_s
exit
_wcmdln
_initterm
memset
__setusermatherr
_XcptFilter
_configthreadlocale
_wcslwr
wcsstr
wcsncpy_s
swscanf
??2@YAPAXI@Z
wcsrchr
??3@YAXPAX@Z
_beginthreadex
malloc
free
wcscat_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_initterm_e
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ