Static task
static1
Behavioral task
behavioral1
Sample
41db79711ae9a2b878481c8d7f755668.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41db79711ae9a2b878481c8d7f755668.exe
Resource
win10v2004-20231215-en
General
-
Target
41db79711ae9a2b878481c8d7f755668
-
Size
462KB
-
MD5
41db79711ae9a2b878481c8d7f755668
-
SHA1
7d6cb1b863e88857ba830d879c77643e07882858
-
SHA256
b03b810ccbb1a6f5954c058b1e6c48ab5c27c98898bc24badbbca40453c1511d
-
SHA512
623e7ed63616ea2cdc689855a99f6224774a0da249289b163ac47bffa8634c605c319bc0e92fa7720568806d5cf12b5a459d7bb42946c1f4b37521cfb2bd1941
-
SSDEEP
12288:4hEM2H+ieJIcbGDVZ8/JR6Yb22RxOiGxUskDC/1/HBrKAyGZpfoAN6dEV:+nIcKvZjoAR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41db79711ae9a2b878481c8d7f755668
Files
-
41db79711ae9a2b878481c8d7f755668.exe windows:10 windows x64 arch:x64
29c9eb4be844e75328ad3dcd8fd99253
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegOpenKeyExW
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
kernel32
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
LocalAlloc
CompareStringOrdinal
MultiByteToWideChar
GetFileAttributesA
HeapSetInformation
LocalFree
WideCharToMultiByte
FormatMessageA
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleW
QueryPerformanceCounter
GetLastError
GetACP
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RegisterApplicationRestart
CreateThread
CloseHandle
user32
GetDlgItem
GetWindowLongPtrA
SetWindowLongPtrA
SendMessageA
PeekMessageA
SetDlgItemTextA
TranslateMessage
DefWindowProcA
IsWindowEnabled
MessageBoxW
SetDlgItemTextW
ShowWindow
LoadStringW
EndDialog
PostMessageA
DialogBoxParamW
EnableWindow
IsDlgButtonChecked
SendMessageW
LoadStringA
DispatchMessageA
msvcrt
memset
?terminate@@YAXXZ
_commode
_fmode
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
toupper
__C_specific_handler
_strnicmp
_acmdln
comctl32
ord17
ntdll
RtlVirtualUnwind
WinSqmSetDWORD
RtlCaptureContext
RtlLookupFunctionEntry
WinSqmAddToStream
shell32
CommandLineToArgvW
shlwapi
PathAppendA
PathRemoveFileSpecA
SHQueryValueExA
StrCmpW
ord487
PathFindFileNameA
ole32
CoInitializeEx
CoUninitialize
CoWaitForMultipleHandles
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ