Static task
static1
Behavioral task
behavioral1
Sample
4ce56fa32a680eb11d66a60d8eaa647046802074704dbb8954c92d136e43cd8a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ce56fa32a680eb11d66a60d8eaa647046802074704dbb8954c92d136e43cd8a.exe
Resource
win10-20231215-en
General
-
Target
4ce56fa32a680eb11d66a60d8eaa647046802074704dbb8954c92d136e43cd8a
-
Size
283KB
-
MD5
82c1efb708fb26c6b79f270f1bd8877d
-
SHA1
b8823e319e0cad41c6a8e58b1d5ec181a2e9943f
-
SHA256
4ce56fa32a680eb11d66a60d8eaa647046802074704dbb8954c92d136e43cd8a
-
SHA512
7966ba92f8755a013ee4c8fff6bd9e8c225e6241af3e7d9c8ef701e71bb8c3ed8e6d124a3eb10f9768815e93e9ee928a06be0f3f077c7179f09f5a0530a594dd
-
SSDEEP
6144:onT7Y5sLv/CGONSkpQOA6ZHGcPPUhL5Y2fdutV:Q7Yyr/C1SkCOZU7/fdMV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ce56fa32a680eb11d66a60d8eaa647046802074704dbb8954c92d136e43cd8a
Files
-
4ce56fa32a680eb11d66a60d8eaa647046802074704dbb8954c92d136e43cd8a.exe windows:5 windows x86 arch:x86
ec0b3403d4565099d8b34b960499fe31
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigW
GetProfileStringW
CancelWaitableTimer
GetCompressedFileSizeW
CancelDeviceWakeupRequest
GlobalAlloc
SetSystemTimeAdjustment
GetConsoleAliasExesLengthW
GetFileAttributesW
IsDBCSLeadByte
ExitThread
SetConsoleTitleA
DeactivateActCtx
CreateJobObjectA
GetLastError
GetCurrentDirectoryW
GetLongPathNameW
SetVolumeLabelW
LocalLock
SetFileAttributesA
DisableThreadLibraryCalls
MoveFileExW
LoadLibraryA
OpenWaitableTimerW
DnsHostnameToComputerNameA
WritePrivateProfileStringA
AddAtomA
GetModuleFileNameA
SetConsoleCursorInfo
GetModuleHandleA
QueryMemoryResourceNotification
lstrcatW
FreeEnvironmentStringsW
BuildCommDCBA
VirtualProtect
SetFileShortNameA
DeleteTimerQueueTimer
LocalFree
CopyFileExA
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleOutputCharacterA
SetFilePointer
SetPriorityClass
GetTempFileNameW
GetAtomNameA
GetEnvironmentVariableW
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
CloseHandle
CreateFileA
HeapSize
GetLocaleInfoW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
ReadFile
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
RaiseException
user32
GetDesktopWindow
GetMonitorInfoA
advapi32
IsValidSid
ReadEventLogW
GetPrivateObjectSecurity
GetServiceKeyNameW
PrivilegedServiceAuditAlarmW
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bunisiw Size: 1024B - Virtual size: 577B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ