Static task
static1
Behavioral task
behavioral1
Sample
47b801265cb7079f9123841190d12dda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47b801265cb7079f9123841190d12dda.exe
Resource
win10v2004-20231215-en
General
-
Target
47b801265cb7079f9123841190d12dda
-
Size
83KB
-
MD5
47b801265cb7079f9123841190d12dda
-
SHA1
3350099bcd55c8b638c0443ada40eafce83671b2
-
SHA256
34c6231a10f690c4183465705637a681bdae61208979d3fe8c1ab6a47e8d6e2f
-
SHA512
30cd4f83749d4293fd789a1dc96a2d304bceded9cfbbccb4814243c53d3561dfa444b4e6acc02a9bfbf3bed932e46dabd66a0503f3c161731d58c4b7c4fa5dda
-
SSDEEP
1536:EtcYlvJL8BS9q499rbQwNXhBbke6JaVeJqlTO0:Mc5uDr93f6JaVeJqlS0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47b801265cb7079f9123841190d12dda
Files
-
47b801265cb7079f9123841190d12dda.exe windows:4 windows x86 arch:x86
a88d2dcd95d9c2dd51d361a8c66e79dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohl
htonl
bind
closesocket
getsockname
gethostbyname
WSAStartup
setsockopt
send
listen
accept
WSACleanup
inet_addr
shutdown
recv
inet_ntoa
socket
htons
ioctlsocket
connect
select
shell32
SHGetFolderPathA
advapi32
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
kernel32
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetEndOfFile
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
RaiseException
IsBadReadPtr
TerminateThread
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
InterlockedDecrement
GetTickCount
Sleep
CopyFileA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
SetFileTime
CloseHandle
GetFileTime
CreateFileA
SetFileAttributesA
ExitThread
GetSystemDirectoryA
CreateDirectoryA
GetModuleFileNameA
GlobalFree
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
SetFilePointer
WriteFile
GetFileSize
FindClose
FindNextFileA
lstrcatA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GetDriveTypeA
LeaveCriticalSection
EnterCriticalSection
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ExitProcess
CreateProcessA
WaitForSingleObject
CreateMutexA
SetErrorMode
GetTempPathA
GetLastError
GetVersionExA
HeapSize
ExpandEnvironmentStringsA
GetFileAttributesA
GetModuleHandleA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetCurrentProcess
TerminateProcess
ReadFile
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetVersion
GetCommandLineA
GetStartupInfoA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RtlUnwind
user32
SetClipboardData
CloseClipboard
EmptyClipboard
OpenClipboard
VkKeyScanA
keybd_event
FindWindowA
GetWindowThreadProcessId
CharLowerA
BlockInput
SetForegroundWindow
SetFocus
ShowWindow
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
GetErrorInfo
VariantInit
SysFreeString
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE