Static task
static1
Behavioral task
behavioral1
Sample
4850364cfc0b236ede414e3ba9c49cf6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4850364cfc0b236ede414e3ba9c49cf6.exe
Resource
win10v2004-20231215-en
General
-
Target
4850364cfc0b236ede414e3ba9c49cf6
-
Size
258KB
-
MD5
4850364cfc0b236ede414e3ba9c49cf6
-
SHA1
99221811d4db170772364ffe499e9b552f86bd11
-
SHA256
9d77edc310b894968380c6015bdcc3148d7c2b5611cf6772fdba7784a24e32d0
-
SHA512
8d02d4a49e13ffc1527b9caddd690de6675ec4af0a3e90ab1d13145101516ec737305a8ed4375b3374038a7dd33b6ad356777d4f51f862a194c53107fa5fb124
-
SSDEEP
6144:DDPyURtBdkcc+ELKZOL3ptdD9D9iq/1ufZ1/HEbIkrWV:DDxRhTuLXzlziq/wfnHOZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4850364cfc0b236ede414e3ba9c49cf6
Files
-
4850364cfc0b236ede414e3ba9c49cf6.exe windows:4 windows x86 arch:x86
8bc3a91d1b3a6bb39171a8696336741a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetWindowsDirectoryA
FindClose
GetLastError
FindFirstFileA
GetTempPathA
GetVersionExA
FreeLibrary
LoadLibraryA
lstrcpynA
lstrlenA
GetCommandLineA
CloseHandle
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetShortPathNameA
lstrcmpiA
CopyFileA
lstrcpyA
DeleteFileA
MultiByteToWideChar
TerminateProcess
WaitForSingleObject
OpenProcess
HeapAlloc
GetSystemInfo
HeapCreate
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleA
FileTimeToSystemTime
ExitProcess
HeapFree
lstrcatA
EnumResourceNamesA
GetLocalTime
SystemTimeToFileTime
GetTickCount
Sleep
GetStartupInfoA
LocalAlloc
InterlockedExchange
RaiseException
GetProcAddress
user32
SendMessageTimeoutA
IsWindow
CharNextA
PostQuitMessage
CreateWindowExA
wsprintfA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
GetWindowThreadProcessId
DestroyWindow
CallWindowProcA
GetWindowLongA
SetWindowLongA
FindWindowA
LoadStringA
DefWindowProcA
advapi32
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VarR8FromStr
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ