Static task
static1
Behavioral task
behavioral1
Sample
443c6b36974b58eca6b143b984f02943.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
443c6b36974b58eca6b143b984f02943.exe
Resource
win10v2004-20231222-en
General
-
Target
443c6b36974b58eca6b143b984f02943
-
Size
15KB
-
MD5
443c6b36974b58eca6b143b984f02943
-
SHA1
2374777fd0472422a7ab62028fdce546710e78f8
-
SHA256
73f92d30b651fb6ac55baec53aa581d0ec2146d1c886fef26bc63b2e26a77a3e
-
SHA512
9b369157f86c38fe1e320bad70f9447c5b933191ab2e8c4ee859e24e78afa9656fcd629cc384b610b36204ae338636f6effbdebac171e8a50e2353eca033c183
-
SSDEEP
384:MyGD+uTT8ggQXEQLynjZSZjYl9+4j/N30zGzfy/G:d7WT8hQXEbn9EwJnzfMG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 443c6b36974b58eca6b143b984f02943
Files
-
443c6b36974b58eca6b143b984f02943.exe windows:1 windows x86 arch:x86
98917fbf379e25b0298447737ab75d52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
EnableWindow
DdeCreateStringHandleA
GetWindowModuleFileNameW
ShowWindow
GetCaretBlinkTime
ole32
CoInitializeWOW
CoGetStandardMarshal
CoQueryProxyBlanket
StgOpenStorage
CoDisconnectObject
OleGetIconOfFile
oleaut32
VarR8FromCy
RegisterActiveObject
OaBuildVersion
VarR8Round
VarDiv
SafeArrayRedim
VarR8FromBool
ntdll
ZwImpersonateAnonymousToken
ZwClose
RtlConsoleMultiByteToUnicodeN
wcstol
RtlAddActionToRXact
ZwQueryDefaultUILanguage
RtlDebugPrintTimes
NtCancelIoFile
advapi32
CryptAcquireContextA
SetSecurityDescriptorOwner
EncryptFileA
DeleteAce
GetAclInformation
GetSecurityInfo
AddAuditAccessAce
AddAccessAllowedAce
Sections
.idata Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 916B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ