Static task
static1
Behavioral task
behavioral1
Sample
4d8fe77a34bd13fd59b183bdb877c444.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d8fe77a34bd13fd59b183bdb877c444.exe
Resource
win10v2004-20231215-en
General
-
Target
4d8fe77a34bd13fd59b183bdb877c444
-
Size
42KB
-
MD5
4d8fe77a34bd13fd59b183bdb877c444
-
SHA1
897e0fd8ee533a53cb6fa847fcdb5b5c1b55baad
-
SHA256
967222f8c657b546e83bac7cc75e4f701529ef7ea757c5fd087c62ea3c7788f9
-
SHA512
6106b1d8218bcbc472f521facc58f493e5e9d3b6f3de20960419e18b1e123c597465a0aaa5ef7d95bf2d49615b75d21706e739dd6c2600a82005037e31394ec3
-
SSDEEP
768:022lUaV2R6mqLDwprB+fV4YGIscBYzZy52J/Q6x6U:b6Uakvp0wcBh5kpx6U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d8fe77a34bd13fd59b183bdb877c444
Files
-
4d8fe77a34bd13fd59b183bdb877c444.exe windows:4 windows x86 arch:x86
977cc3d7092700a39e332b69db2ef43f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
lstrcmpW
CreateEventA
CopyFileExW
lstrcmpiW
FindAtomA
WaitForMultipleObjects
lstrlen
GetLogicalDriveStringsW
GetVolumeInformationW
AddAtomW
lstrcatA
GetModuleHandleW
FileTimeToLocalFileTime
CreateFiber
CreatePipe
lstrcpyA
VirtualAlloc
GetVersionExA
Beep
CreateMutexA
SetUnhandledExceptionFilter
lstrcmpA
GetProcessHeap
GetDateFormatW
user32
GetCursorPos
OpenClipboard
SetScrollPos
DestroyCursor
GetKeyboardLayout
BeginPaint
UpdateLayeredWindow
CreateMenu
MoveWindow
FindWindowW
CreateDialogIndirectParamA
GetTopWindow
MonitorFromWindow
SendDlgItemMessageA
GetMenuItemID
GetActiveWindow
gdi32
StretchBlt
GetBkColor
CreateBitmapIndirect
SetTextColor
advapi32
RegCreateKeyExW
comdlg32
GetOpenFileNameA
FindTextW
GetSaveFileNameA
GetSaveFileNameW
GetOpenFileNameW
ReplaceTextW
shell32
ExtractIconW
ole32
CreateErrorInfo
CoUninitialize
version
VerQueryValueW
VerFindFileW
GetFileVersionInfoSizeA
GetFileVersionInfoW
ws2_32
WSAIoctl
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ