Static task
static1
Behavioral task
behavioral1
Sample
47181859e7b108df5f4198a5d6296356.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47181859e7b108df5f4198a5d6296356.exe
Resource
win10v2004-20231215-en
General
-
Target
47181859e7b108df5f4198a5d6296356
-
Size
387KB
-
MD5
47181859e7b108df5f4198a5d6296356
-
SHA1
166bb5c0a4145a6e5445a042bd7d4e08445eeb73
-
SHA256
c6fa11e755453c1e6da3e75d2423084d2fd93b532ec02e078b6adbce4be91811
-
SHA512
7540eda14be84a126dc938aaaf073ef25b38812252b4fbbafd3aa2000f3c074849f213f66590c706d803b768307c633463d18a605fde0263211f2f0bc17df80a
-
SSDEEP
3072:lZA0VLwg6DCAo7B8rpzgL0VEAmzgYQoB+ZyhQwF5ziPPuW7Tz:l3Lwg6DvbuLG0+ZpwF5mPmS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47181859e7b108df5f4198a5d6296356
Files
-
47181859e7b108df5f4198a5d6296356.exe windows:4 windows x86 arch:x86
fafa4813b6af29149136c09522f06db4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
BeginUpdateResourceA
FreeLibrary
EnumResourceNamesA
LoadLibraryA
OpenFile
CloseHandle
OpenProcess
DeleteFileA
Sleep
WinExec
CopyFileA
GetLastError
SetFileAttributesA
GetFileAttributesA
LockResource
MultiByteToWideChar
FindClose
FindNextFileA
FindFirstFileA
GlobalFree
GlobalAlloc
CreateMutexA
WaitForMultipleObjects
GetExitCodeThread
SetThreadPriority
CreateThread
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
CompareStringW
CompareStringA
UpdateResourceA
EndUpdateResourceA
FindResourceA
SizeofResource
GetTempFileNameA
lstrlenA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
CreateFileA
SetStdHandle
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
SetEnvironmentVariableA
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
SetFilePointer
LCMapStringW
HeapFree
HeapAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
RaiseException
FlushFileBuffers
WriteFile
GetProcAddress
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
ReadFile
GetFullPathNameA
GetCurrentDirectoryA
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
LCMapStringA
user32
MessageBoxA
advapi32
OpenServiceA
QueryServiceStatus
StartServiceA
CloseServiceHandle
OpenSCManagerA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
wininet
InternetOpenA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetGetConnectedState
mpr
WNetOpenEnumA
WNetAddConnection2A
WNetCloseEnum
WNetEnumResourceA
WNetCancelConnection2A
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 302KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE