Static task
static1
Behavioral task
behavioral1
Sample
483ccbbd4dfa557f613549e53285da39.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
483ccbbd4dfa557f613549e53285da39.exe
Resource
win10v2004-20231215-en
General
-
Target
483ccbbd4dfa557f613549e53285da39
-
Size
1.3MB
-
MD5
483ccbbd4dfa557f613549e53285da39
-
SHA1
6dbe8ef7289668ba9d00f24cf4f6669a1331e2f1
-
SHA256
16a30764fc0834ad3b99be5c4b2862c80fb19392aab0bd4e539a5477adc48725
-
SHA512
cb73e9eba41e1a6861360cbeb8e749f0c74066cfe760ba57722eb4516807116d28cf4ab588837b45d9a62ff32715763bdd6bb639c42f238abe45851db5dd4d6c
-
SSDEEP
24576:hY7xjXqXMA18lW938UzdADMDOPigXz1cS42RKca3V2G704Yo:hY7xeXd0O38TYCagXo2RKHzP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 483ccbbd4dfa557f613549e53285da39
Files
-
483ccbbd4dfa557f613549e53285da39.exe windows:4 windows x86 arch:x86
3d593af6c8c97fda57d0f886341bfa97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
CreateDirectoryA
LoadLibraryA
FreeLibrary
DeleteFileA
GetStartupInfoA
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsA
GetVersionExA
InitializeCriticalSection
lstrcpyA
FindFirstFileA
FindNextFileA
LockResource
FreeResource
FindClose
GetProcAddress
LoadResource
GetSystemDirectoryA
GetModuleHandleA
GetWindowsDirectoryA
FindResourceA
lstrlenA
InterlockedIncrement
lstrcmpA
InterlockedDecrement
GetCurrentThreadId
user32
GetSystemMetrics
GetAsyncKeyState
GetCapture
MapDialogRect
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
GetLastActivePopup
GetNextDlgTabItem
IsIconic
CheckMenuItem
ModifyMenuA
GetMenuState
IsWindow
MapWindowPoints
DefWindowProcA
GetFocus
CreateWindowExA
CreateDialogIndirectParamA
ScreenToClient
ClientToScreen
CallWindowProcA
DestroyWindow
EnableMenuItem
GetClientRect
SetWindowLongA
PostQuitMessage
GetTopWindow
IsDialogMessageA
MessageBoxA
DrawTextA
GetWindow
InvalidateRect
IsWindowEnabled
GetWindowLongA
GetActiveWindow
SetActiveWindow
EndPaint
BeginPaint
ReleaseDC
GetDesktopWindow
GetWindowDC
CopyRect
LoadImageA
DestroyCursor
LoadStringA
WinHelpA
UpdateWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
LoadCursorA
SetCursor
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
EndDialog
GetWindowTextA
GetWindowTextLengthA
EnableWindow
ShowWindow
IsWindowVisible
SetFocus
GetSysColor
PostMessageA
GetDlgItem
SetWindowTextA
GetParent
LoadIconA
SendMessageA
SetWindowPos
gdi32
AddFontResourceA
SetBkColor
ExtTextOutA
CreateSolidBrush
DeleteObject
CreatePen
Rectangle
MoveToEx
LineTo
SetPixelV
BitBlt
SetBkMode
GetObjectA
SetTextColor
CreateCompatibleDC
SelectObject
DeleteDC
CreateFontIndirectA
CreateCompatibleBitmap
comctl32
ord17
PropertySheetA
advapi32
RegSetValueExA
RegOpenKeyExA
RegSetValueA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
ShellExecuteA
msvcrt
__p__fmode
__setusermatherr
_controlfp
__p__commode
_adjust_fdiv
_acmdln
_initterm
__getmainargs
_exit
exit
_XcptFilter
calloc
_onexit
__dllonexit
malloc
_fullpath
fwrite
fseek
ftell
fread
fopen
_ftol
fclose
_getmbcp
strrchr
_ismbcdigit
atoi
__set_app_type
_except_handler3
_mbsnbcmp
sprintf
__CxxFrameHandler
??3@YAXPAX@Z
memset
_stricmp
memcpy
strlen
strncmp
strcat
_splitpath
??2@YAPAXI@Z
_strdup
free
__p___argv
__p___argc
_mbclen
wcslen
_mbsinc
memmove
_mbsstr
vsprintf
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ