Static task
static1
Behavioral task
behavioral1
Sample
4c20c3fdee5e3ea45aacec10a3cb4c04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c20c3fdee5e3ea45aacec10a3cb4c04.exe
Resource
win10v2004-20231215-en
General
-
Target
4c20c3fdee5e3ea45aacec10a3cb4c04
-
Size
7KB
-
MD5
4c20c3fdee5e3ea45aacec10a3cb4c04
-
SHA1
f9136556d44dd30b0fb2b76215c9dfb10224b429
-
SHA256
3ca2fc9942b1004de09c1a4a76b8403138fd97e30343adb4f92269dc52e04d60
-
SHA512
746452b1e8fcf2f4c73c0f82cfe3ef611a9bf92d826de524d79cf4162f47945373f3d3dbe4206ec30a69b83568c412617ae798281e63956d8ad7926eb8b06846
-
SSDEEP
192:epbWBm7EA/WvU0JOXt+MR4ghf9AQuT61oy:edhsy+MR4wT861
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c20c3fdee5e3ea45aacec10a3cb4c04
Files
-
4c20c3fdee5e3ea45aacec10a3cb4c04.exe windows:4 windows x86 arch:x86
f683366ddf493cd68d5fc61a44ca3135
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
Sleep
SetUnhandledExceptionFilter
GetModuleFileNameA
ExpandEnvironmentStringsA
SetLastError
lstrcmpiA
lstrlenA
lstrcpyA
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
lstrcatA
GetLastError
GetModuleHandleA
GetStartupInfoA
user32
PostThreadMessageA
GetInputState
wsprintfA
GetMessageA
advapi32
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
StartServiceA
OpenSCManagerA
CreateServiceA
msvcrt
??1type_info@@UAE@XZ
_controlfp
_except_handler3
strchr
fclose
fwrite
fopen
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
strstr
??3@YAXPAX@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ