Static task
static1
Behavioral task
behavioral1
Sample
41993fba38a64d1fbd049f513a3c5694.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41993fba38a64d1fbd049f513a3c5694.exe
Resource
win10v2004-20231215-en
General
-
Target
41993fba38a64d1fbd049f513a3c5694
-
Size
951KB
-
MD5
41993fba38a64d1fbd049f513a3c5694
-
SHA1
b805f807e390799d56aa672168b2bc440d2fad55
-
SHA256
786a34dfd4a0d9e05bc14c9270237cf66a91df2c46bb713cab219ec9095af305
-
SHA512
ba1bcbd3f80ec4041632e956eecd9a32581aae7448929ac04d64ec6283e64559383bf0f3a267c0344c7e3fbf26b294a4b220a33d4ed3fba12ac3cf1bcce19aaf
-
SSDEEP
12288:Hw8TvKo4GDBSX47FRIDBrgh9ZRv8KypzwbnsBO3nw03O7Vgso5Y4R8myxHaDs9JP:Hw/pGU8FGDtggKKu3l30V078m0ysn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41993fba38a64d1fbd049f513a3c5694
Files
-
41993fba38a64d1fbd049f513a3c5694.exe windows:5 windows x86 arch:x86
d18620197e4cfd2810b5a03d2614b6f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
FreeLibrary
GetModuleFileNameA
LocalAlloc
DeleteCriticalSection
DisableThreadLibraryCalls
UnhandledExceptionFilter
InterlockedExchange
QueryPerformanceCounter
GetModuleFileNameW
UnhandledExceptionFilter
GetVersionExA
GetProcAddress
CreateThread
InitializeCriticalSection
InterlockedCompareExchange
GetCurrentThreadId
VirtualAlloc
HeapFree
MultiByteToWideChar
FreeLibrary
GetProcessHeap
InterlockedDecrement
CloseHandle
HeapFree
QueryPerformanceCounter
HeapAlloc
GetLastError
DeleteCriticalSection
LoadLibraryW
GetProcessHeap
InterlockedExchange
LeaveCriticalSection
InterlockedCompareExchange
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
CreateThread
CloseHandle
CloseHandle
InterlockedCompareExchange
CreateFileW
CreateThread
lstrlenA
FreeLibrary
SetLastError
CloseHandle
HeapAlloc
GetSystemTimeAsFileTime
ReadFile
LoadLibraryA
LoadLibraryA
FreeLibrary
GetProcessHeap
VirtualAlloc
InterlockedDecrement
LocalFree
GetProcessHeap
InterlockedIncrement
user32
SetWindowTextW
GetClientRect
GetParent
SetDlgItemTextW
EnableWindow
ShowWindow
SendMessageW
GetClientRect
IsWindow
SetForegroundWindow
DefWindowProcW
EndPaint
ReleaseDC
GetSystemMetrics
SetWindowPos
GetWindowRect
EndDialog
DefWindowProcW
SetWindowLongW
EndDialog
MessageBoxW
LoadStringW
LoadCursorW
SetWindowTextW
LoadIconW
DispatchMessageW
EndDialog
GetDlgItem
LoadCursorW
SendMessageW
GetDesktopWindow
MessageBoxW
InvalidateRect
CreateWindowExW
SetDlgItemTextW
PostQuitMessage
SendMessageW
GetSystemMetrics
ReleaseDC
PostMessageW
SetWindowLongW
TranslateMessage
GetWindowRect
DefWindowProcW
GetSystemMetrics
DispatchMessageW
SendDlgItemMessageW
BeginPaint
SetCursor
TranslateMessage
LoadCursorW
LoadIconW
wsprintfA
EndDialog
EndDialog
DialogBoxParamW
CreateWindowExW
SendMessageW
SetWindowLongW
GetSystemMetrics
BeginPaint
PostMessageW
GetDlgItem
DefWindowProcW
LoadStringW
MessageBoxW
Sections
.text Size: 946KB - Virtual size: 1.4MB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ