Static task
static1
Behavioral task
behavioral1
Sample
43043fbd7a6321731663aaeadd90c3c9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43043fbd7a6321731663aaeadd90c3c9.exe
Resource
win10v2004-20231215-en
General
-
Target
43043fbd7a6321731663aaeadd90c3c9
-
Size
91KB
-
MD5
43043fbd7a6321731663aaeadd90c3c9
-
SHA1
87c68525eec4011243fb7edd8608e7fb806a80af
-
SHA256
5bd4c0f68cb89b720876255a8c2e965b64885609e801dd515c63a1d58fe6fb33
-
SHA512
e72575dc49d79e289a07554fedcc6d5da2618e6f2a1af90ae25ca88a62e566c36fedda0e48c6e1f486c8bb1dc36cb50d86223ad31dfcf479a594d359f9eb8cd4
-
SSDEEP
1536:wQUpI2+SyDTvz7Lu/Y6jJ6S7hXqlky78QxYvA5ZvlneETaSz8Kzam2:g+9DTvz75Kldqln7tYv6Zvl7z8Kzam2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43043fbd7a6321731663aaeadd90c3c9
Files
-
43043fbd7a6321731663aaeadd90c3c9.exe windows:4 windows x86 arch:x86
ab5fd9675344596fcfb613f557bb7b02
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetTempPathA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
LocalFree
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateProcessA
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
FreeLibrary
LoadLibraryA
GetProcAddress
GetExitCodeProcess
GetCurrentDirectoryA
GetFileType
SetCurrentDirectoryA
lstrcatA
lstrlenA
WinExec
CloseHandle
SetFilePointer
GetSystemDirectoryA
WriteFile
ReadFile
CreateFileA
GetLastError
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
GetWindowsDirectoryA
FreeEnvironmentStringsW
SetFileAttributesA
GetFileAttributesA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapCompact
HeapAlloc
HeapReAlloc
HeapFree
RemoveDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
SetEnvironmentVariableA
user32
SendMessageA
GetWindow
GetSystemMetrics
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
CreateDialogParamA
GetDlgItem
DestroyWindow
PostQuitMessage
DefWindowProcA
CharToOemA
DialogBoxParamA
EndDialog
SetDlgItemTextA
TranslateMessage
DispatchMessageA
GetMessageA
IsDialogMessageA
SetWindowLongA
SetWindowTextA
MessageBoxA
wsprintfA
PeekMessageA
gdi32
DeleteObject
RemoveFontResourceA
GetObjectA
CreateFontIndirectA
GetStockObject
advapi32
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegCloseKey
shell32
SHGetPathFromIDListA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
OleUninitialize
OleInitialize
comctl32
ord17
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ