Static task
static1
Behavioral task
behavioral1
Sample
4a2caf17d189de11ee0dda216a4ede36.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a2caf17d189de11ee0dda216a4ede36.exe
Resource
win10v2004-20231215-en
General
-
Target
4a2caf17d189de11ee0dda216a4ede36
-
Size
374KB
-
MD5
4a2caf17d189de11ee0dda216a4ede36
-
SHA1
1ca0719d145014765ff176ea00aa2a4a6b022ac1
-
SHA256
49d47096d914177aab965d94d4f32b61e5b48122ba17b801a2be4fc537b165b9
-
SHA512
2014c6f597dff6e3d8cbd325ab8f022be7233b4732bbaa8277c60d780dad15666f6352bd0ac49bb260993ea76a57aa3dab17257200575b95394e6310422e39a8
-
SSDEEP
6144:+jRM59KP9EoxGcTYNh91DQJ7w6Mcx8MYeWKnEWYzXTz+VNypJOVglH5fDsf1KpXE:IRM5LL9/u5Wcxr8/frTzcNS0G3fDsf1D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a2caf17d189de11ee0dda216a4ede36
Files
-
4a2caf17d189de11ee0dda216a4ede36.exe windows:4 windows x86 arch:x86
e8500448d5c76022392e567a2c330bb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
FindClose
GetEnvironmentVariableW
LocalFlags
InitializeCriticalSection
GetDriveTypeW
ReadFile
TlsGetValue
lstrlenW
GetPrivateProfileStringA
LocalFree
HeapCreate
GetCurrentProcessId
SuspendThread
GetCurrentThreadId
CreateEventW
GetConsoleAliasA
LoadLibraryW
ResumeThread
FindAtomA
user32
GetClientRect
DrawStateW
DrawTextA
DispatchMessageA
GetSysColor
SetFocus
CreateWindowExA
EndDialog
IsWindow
GetClassInfoA
GetSysColor
CallWindowProcW
GetKeyboardType
srclient
EnableSR
EnableSR
EnableSR
EnableSR
EnableSR
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ