GetComputerObject
Static task
static1
Behavioral task
behavioral1
Sample
4b545f7a3f7560e94ffbc0b10f7efb06.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b545f7a3f7560e94ffbc0b10f7efb06.exe
Resource
win10v2004-20231222-en
General
-
Target
4b545f7a3f7560e94ffbc0b10f7efb06
-
Size
42KB
-
MD5
4b545f7a3f7560e94ffbc0b10f7efb06
-
SHA1
006a62815ef74e58f807f354fd96ef926d7e4e54
-
SHA256
e3c44081666fc7ab9212e6d01173315d57383d6819adc255d3ec92469771ea68
-
SHA512
165623f133b1028c9acba0c7ce7dc0faf045adcb5f2e9a038670b3d65a1afc2716b01700cec951dec425e175d6c34734a800664baa421748af5a5b5dc3440a4a
-
SSDEEP
768:vORQdKcSRzeWetJSk3VN8UHMXae0HQRB2lX56hqD+G7uD:MvcSRZQcUHq0wRBc56tG7uD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b545f7a3f7560e94ffbc0b10f7efb06
Files
-
4b545f7a3f7560e94ffbc0b10f7efb06.exe windows:4 windows x86 arch:x86
09831e5258e3e91dc4c53e88e15a3de5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
ExitProcess
FindResourceA
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
GetUserDefaultLCID
GlobalLock
HeapAlloc
HeapCreate
HeapReAlloc
InitializeCriticalSection
IsDebuggerPresent
LCMapStringA
MultiByteToWideChar
RtlUnwind
SetLastError
SetUnhandledExceptionFilter
TlsFree
lstrcatA
lstrcpynA
msvcrt
__p__commode
__set_app_type
_stricmp
exit
malloc
wcslen
__getmainargs
user32
DefDlgProcA
IsDlgButtonChecked
IsZoomed
MoveWindow
ScreenToClient
SetDlgItemTextA
SetForegroundWindow
CreatePopupMenu
CreateIconIndirect
GetParent
ole32
CoCreateInstance
CLSIDFromString
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ