Static task
static1
Behavioral task
behavioral1
Sample
4a64d5f667cdff716615beb56c6549df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a64d5f667cdff716615beb56c6549df.exe
Resource
win10v2004-20231215-en
General
-
Target
4a64d5f667cdff716615beb56c6549df
-
Size
176KB
-
MD5
4a64d5f667cdff716615beb56c6549df
-
SHA1
7df241a14a74ebf588ec66454fec101b8500d94e
-
SHA256
39d7d7f63fb75f2f384ac21eaffd33c45fc8a2344c0d9b8d42cbf616634cb292
-
SHA512
82ac9385feeb1cb7d605d51878e64b06f1ef331f929bb5bc1b7837dd5851d9481157c85c1bb2a7994a755dbaec4641d6d94df0ee35428577a6a2981e97fa85ea
-
SSDEEP
3072:hSEvSLdIn7ftTwSckTHEKiXNbOLOUpL/ko1ccfCTR9gjOIz4p:UEvSJIn7lTwSckTRy4xT1cACTfgjdk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a64d5f667cdff716615beb56c6549df
Files
-
4a64d5f667cdff716615beb56c6549df.exe windows:5 windows x86 arch:x86
f31dccd9d5061476acb8726d40cc3891
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetDriveTypeA
GetModuleFileNameA
GetFileAttributesA
GetLogicalDriveStringsA
MoveFileA
GetLastError
DeleteFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
LockResource
LoadResource
SizeofResource
FindResourceA
lstrcpynA
FreeResource
LoadLibraryA
UnmapViewOfFile
FreeLibrary
EnumResourceNamesA
LoadLibraryExA
ExpandEnvironmentStringsA
SetFileAttributesA
CloseHandle
MapViewOfFile
FindFirstFileA
GetFileSize
CreateFileA
Sleep
CreateMutexA
GetTempFileNameA
GetTickCount
GetTempPathA
CopyFileW
DeleteFileW
GetCommandLineW
OpenMutexA
lstrcpyA
ExitThread
GetExitCodeThread
TerminateThread
WaitForSingleObject
CreateThread
GetVersionExA
lstrlenA
GetModuleFileNameW
InterlockedDecrement
GetSystemDirectoryW
LocalFree
GetStartupInfoA
lstrlenW
CopyFileA
FindNextFileA
FindClose
GetCurrentThreadId
GetCurrentProcessId
CreateFileMappingA
OutputDebugStringA
user32
wsprintfW
wsprintfA
wvsprintfA
advapi32
RegSetValueExW
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
GetUserNameW
shell32
SHGetFolderPathA
SHGetFolderPathW
ShellExecuteA
ShellExecuteW
CommandLineToArgvW
ole32
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SetErrorInfo
VariantClear
VariantInit
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
CreateErrorInfo
msvcrt
strrchr
_strdup
atoi
strchr
memcmp
memcpy
realloc
fclose
fwrite
fopen
strlen
srand
mbstowcs
wcsncmp
wcslen
wcsstr
??3@YAXPAX@Z
??2@YAPAXI@Z
calloc
_CxxThrowException
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__dllonexit
_onexit
free
_stricmp
strstr
sprintf
strcpy
strncpy
strncmp
memset
strcat
_except_handler3
strcmp
?terminate@@YAXXZ
rand
??1type_info@@UAE@XZ
wininet
HttpOpenRequestA
InternetCloseHandle
InternetOpenA
InternetConnectA
InternetReadFile
HttpSendRequestA
HttpQueryInfoA
ws2_32
WSAStartup
getaddrinfo
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ