Static task
static1
Behavioral task
behavioral1
Sample
4a86e7f393925248b9cdfb8ae4dc37a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a86e7f393925248b9cdfb8ae4dc37a4.exe
Resource
win10v2004-20231215-en
General
-
Target
4a86e7f393925248b9cdfb8ae4dc37a4
-
Size
147KB
-
MD5
4a86e7f393925248b9cdfb8ae4dc37a4
-
SHA1
a763682d4442178ae67c114af6aba405c57c6dd4
-
SHA256
18c99b018915626842af71aa9428cd99c0fb2dbfa52f280cfd8df22794419a8e
-
SHA512
9beededa732ad06fe78eed443add4f1135ac817268f3800f03f857b9a421fe20fa83731b6fbe16e058f61e158bd5b1557b784c57f2309184aa04ba0a300bf4a9
-
SSDEEP
1536:bxXd6PNfCKyFdI7xPQddEga9k9oPbRFb1/Ek/2LI3D/2NSEhJDa9k2ynm92ECzvt:r682PCqgaWKPlFBp172/Oyn7EaCE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a86e7f393925248b9cdfb8ae4dc37a4
Files
-
4a86e7f393925248b9cdfb8ae4dc37a4.exe windows:4 windows x86 arch:x86
1f791ec55f94d86994bb8ec5dff6bead
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegSetValueExW
RegSetValueW
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyW
RegEnumKeyExW
user32
UnionRect
IsWindow
SetCursor
IsRectEmpty
CreatePopupMenu
GetFocus
GetClientRect
EnableWindow
IntersectRect
UpdateWindow
SetRect
CloseClipboard
FillRect
SetClipboardData
TrackPopupMenuEx
SetParent
PtInRect
ReleaseDC
RedrawWindow
InvalidateRect
GetDesktopWindow
SetCapture
OpenClipboard
GetKeyState
GetParent
ClientToScreen
GetClipboardData
EmptyClipboard
CopyRect
SetWindowPos
GetDC
DestroyMenu
SendMessageW
ReleaseCapture
EqualRect
LoadCursorW
OffsetRect
ClipCursor
TranslateMessage
GetWindowRect
SetRectEmpty
wsprintfW
ScreenToClient
msimg32
AlphaBlend
TransparentBlt
shlwapi
PathCombineW
PathRemoveBackslashW
PathRenameExtensionW
PathAppendW
PathRemoveFileSpecW
PathIsRelativeW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
shell32
SHGetSpecialFolderPathW
DragQueryFileW
comctl32
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
gdiplus
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipCreateBitmapFromFile
GdipDisposeImage
kernel32
GetThreadLocale
GetCurrentProcessId
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
GetVersionExW
GetProcAddress
FindNextFileW
ClearCommBreak
GetVersionExA
FreeLibrary
MultiByteToWideChar
GetACP
OutputDebugStringW
ClearCommBreak
GetLastError
ReadFile
GlobalLock
FindClose
GetTickCount
lstrlenA
EnumResourceNamesW
lstrlenW
GetFullPathNameW
GetLocaleInfoA
SetFileAttributesW
CopyFileW
RemoveDirectoryW
CreateFileW
LoadLibraryW
GetTempPathW
LeaveCriticalSection
GetModuleFileNameA
GetTempFileNameW
InterlockedExchange
GlobalAlloc
ExitProcess
GetModuleFileNameW
ExitProcess
Sleep
DisableThreadLibraryCalls
InterlockedDecrement
DeleteFileW
LocalAlloc
CloseHandle
WideCharToMultiByte
GetCurrentThreadId
LocalFree
CreateDirectoryW
GlobalUnlock
FindFirstFileW
QueryPerformanceCounter
InterlockedIncrement
GetFileAttributesExW
gdi32
CreateSolidBrush
GetObjectType
BitBlt
LineTo
CreateFontIndirectW
SetROP2
PtInRegion
MoveToEx
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateDCW
CreatePolygonRgn
BeginPath
DeleteDC
SetBkMode
GetDeviceCaps
SetStretchBltMode
CreateBitmap
SelectObject
StrokePath
GetBitmapBits
Polyline
InvertRgn
StretchBlt
CreatePen
EndPath
DeleteObject
ExtCreatePen
GetObjectW
winmm
timeGetTime
ole32
CoUninitialize
CoFreeUnusedLibraries
CoInitialize
StringFromGUID2
CoCreateInstance
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsr Size: 512B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ