Static task
static1
Behavioral task
behavioral1
Sample
4414682470d15014d3d0ee2b3a5608ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4414682470d15014d3d0ee2b3a5608ea.exe
Resource
win10v2004-20231222-en
General
-
Target
4414682470d15014d3d0ee2b3a5608ea
-
Size
502KB
-
MD5
4414682470d15014d3d0ee2b3a5608ea
-
SHA1
1cb2506dfe30498cb964982777b0cd5a98e305f4
-
SHA256
54e796c379f78508b75773ed6bb3fa749c339afe255c84eb5e6281d49566be16
-
SHA512
902018192d53f473e8e986f95d17912ec1ecf61fb7635b7c40ed2f6d7f04e19e9bae349ca4b7949a99ee0e03c330babc16e7bf16f9f10d13357396c6575db6ba
-
SSDEEP
12288:S8DeVZ4fcpysFvi91U7itl/UyhePrtj8:S86pIH2yh8j8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4414682470d15014d3d0ee2b3a5608ea
Files
-
4414682470d15014d3d0ee2b3a5608ea.exe windows:5 windows x86 arch:x86
59a6aeaec3f8d57001efa7e78f48a7be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
GetDeviceCaps
DeleteDC
SetTextColor
CreateCompatibleDC
SelectObject
SetBkMode
advapi32
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegDeleteKeyA
kernel32
VirtualAlloc
Sleep
VirtualFree
HeapCreate
WideCharToMultiByte
SizeofResource
SetStdHandle
GetCurrentThreadId
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCurrentDirectoryA
LockResource
GetCurrentProcessId
GetEnvironmentStrings
lstrlenW
GetEnvironmentStringsW
FindNextFileW
LCMapStringA
FindResourceW
GlobalFree
UnmapViewOfFile
LCMapStringW
GetLastError
InterlockedIncrement
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateProcessA
GlobalLock
FindFirstFileW
CompareStringA
FindFirstFileA
GetProcessHeap
GetSystemInfo
GetProcAddress
GetModuleHandleW
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
GetVersionExA
VirtualProtect
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetOEMCP
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
GetVersion
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetPrivateProfileStringA
GetModuleFileNameA
FlushFileBuffers
ExitProcess
GetModuleFileNameW
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
LocalFree
SetEvent
GetStringTypeW
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
GetCPInfo
GetLocaleInfoW
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetFileAttributesA
ReleaseMutex
GetStdHandle
GetEnvironmentVariableA
RtlUnwind
HeapReAlloc
user32
SetCursor
CallWindowProcA
GetClientRect
DrawTextA
InvalidateRect
GetFocus
GetSysColor
EndDialog
GetDesktopWindow
LoadCursorA
ScreenToClient
GetDlgItem
SetWindowLongA
ReleaseCapture
GetWindowRect
GetSystemMetrics
PeekMessageA
SetFocus
CreateWindowExA
GetSubMenu
RegisterClassA
IsIconic
IsWindowEnabled
TranslateMessage
MapWindowPoints
EnableWindow
ShowWindow
DefWindowProcA
UpdateWindow
DestroyWindow
ReleaseDC
GetCursorPos
GetDC
IsWindow
LoadBitmapA
PostQuitMessage
MoveWindow
SetForegroundWindow
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 478KB - Virtual size: 478KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ