Static task
static1
Behavioral task
behavioral1
Sample
44f4470b5bf7458560771d271d98b6a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44f4470b5bf7458560771d271d98b6a7.exe
Resource
win10v2004-20231215-en
General
-
Target
44f4470b5bf7458560771d271d98b6a7
-
Size
275KB
-
MD5
44f4470b5bf7458560771d271d98b6a7
-
SHA1
741a79bc9e6f3fda235165eeac20922cfd9c14cd
-
SHA256
d485a6b66fd23dc69fa962ed4288b5d58780155f7f3a4b9720c96767174854e2
-
SHA512
6d91e0a3cea32351b619819b68bee55b421734cd2ca71ea0f2d19df0a5648520fe820898f8f742db90d61bed58e9cd995a56f2e9d1f4b079ae2ea28a1f640e20
-
SSDEEP
6144:MT9jEr2XcCDYf7vYErdML6DfRs/xsNQuZBv0m1KUiF5DVA+:69jhXmpdb6/Cbv0m1R+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44f4470b5bf7458560771d271d98b6a7
Files
-
44f4470b5bf7458560771d271d98b6a7.exe windows:4 windows x86 arch:x86
03e69ccebe0f36c071fc7a82758570b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextFaceA
CreateBitmapIndirect
GetCharacterPlacementW
GetTextCharsetInfo
SetDIBits
CreateHalftonePalette
shell32
SheGetDirA
RealShellExecuteW
SHGetFileInfo
SHGetSettings
SHGetDataFromIDListA
ExtractAssociatedIconExW
SHGetFileInfoW
SHEmptyRecycleBinW
ExtractIconExW
CommandLineToArgvW
SHFileOperationW
DoEnvironmentSubstA
ShellExecuteEx
SHGetSpecialFolderLocation
RealShellExecuteExA
SHEmptyRecycleBinA
ExtractAssociatedIconW
DragQueryFileA
ShellExecuteA
ShellAboutA
user32
FlashWindow
SetScrollPos
GetClipboardSequenceNumber
CharUpperBuffA
ReplyMessage
CallNextHookEx
GetKeyNameTextW
ValidateRect
UnregisterClassW
CreateIcon
ModifyMenuW
OffsetRect
DdeCreateDataHandle
comdlg32
LoadAlterBitmap
FindTextA
ReplaceTextA
GetOpenFileNameW
GetSaveFileNameW
PageSetupDlgW
PageSetupDlgA
ChooseColorA
GetFileTitleW
GetSaveFileNameA
PrintDlgW
GetFileTitleA
ChooseColorW
ChooseFontW
GetOpenFileNameA
FindTextW
PrintDlgA
kernel32
CompareStringW
GetLastError
VirtualFree
GetSystemTimeAsFileTime
GetModuleFileNameA
MultiByteToWideChar
CopyFileA
WideCharToMultiByte
ExitProcess
LCMapStringW
EnumSystemLocalesA
GetVersionExA
FlushFileBuffers
SetHandleCount
GetThreadSelectorEntry
TlsGetValue
LoadLibraryA
VirtualQuery
GetCommandLineW
GetLocaleInfoW
RtlUnwind
GetFileType
HeapReAlloc
VirtualAlloc
EnumResourceLanguagesA
GetStartupInfoA
DeleteCriticalSection
GetCurrentThread
GetCurrentThreadId
TlsSetValue
SetVolumeLabelA
CompareStringA
GetACP
InitializeCriticalSection
GetCPInfo
ReleaseMutex
GetDateFormatA
GetShortPathNameW
GetLocaleInfoA
SetFilePointer
HeapSize
GetStdHandle
HeapCreate
FreeEnvironmentStringsA
GetCurrentProcessId
InterlockedExchange
GetTickCount
WriteFile
LeaveCriticalSection
GetCommandLineA
GetComputerNameA
SystemTimeToTzSpecificLocalTime
GetEnvironmentStrings
TlsFree
ReadConsoleOutputAttribute
GetModuleFileNameW
GetEnvironmentStringsW
IsBadWritePtr
LCMapStringA
GetOEMCP
GetDateFormatW
lstrcpyA
HeapFree
FreeEnvironmentStringsW
GetCurrentProcess
GetFileAttributesW
QueryPerformanceCounter
GetStartupInfoW
VirtualProtect
ExpandEnvironmentStringsW
ConvertDefaultLocale
SetLastError
TerminateProcess
GetTimeZoneInformation
GetDiskFreeSpaceExW
GlobalGetAtomNameW
HeapDestroy
GetStringTypeA
GetCompressedFileSizeA
GetUserDefaultLCID
GetModuleHandleA
IsValidCodePage
IsValidLocale
LockResource
GetProcAddress
GetSystemInfo
HeapAlloc
UnhandledExceptionFilter
GetStringTypeW
EnterCriticalSection
TlsAlloc
SetEnvironmentVariableA
GetTimeFormatA
GetNamedPipeInfo
wininet
InternetOpenUrlW
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ