Static task
static1
Behavioral task
behavioral1
Sample
4c8cc4b45026593add8124444d45e99d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c8cc4b45026593add8124444d45e99d.exe
Resource
win10v2004-20231215-en
General
-
Target
4c8cc4b45026593add8124444d45e99d
-
Size
83KB
-
MD5
4c8cc4b45026593add8124444d45e99d
-
SHA1
e484270fcfe850e31a041b03fabe2906317c942b
-
SHA256
37f4608e29ccae57c39e3e6d2e190e843a96f4a7799b5a94496779fce1761e72
-
SHA512
a3fba2be69378a6c237e02d0f98385de5553b7c4c8f1f178e1d3c327798149e2f440793bf089f5f4791a8905aae685f8954a53164905d2bd0dc448d7e5f4f3bf
-
SSDEEP
1536:+9NWJTEHVHXZ816fT3nn0ULEmOgrttEP4ia/AELt0pjVrs2ryrd1vUQuq8:sMAT8oT30ULELSEAi3ELuHs2q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c8cc4b45026593add8124444d45e99d
Files
-
4c8cc4b45026593add8124444d45e99d.exe windows:4 windows x86 arch:x86
a6ee7210bf1a3787525c4eb0dc413eac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
LocalShrink
VirtualQuery
GetDriveTypeW
SetLocalPrimaryComputerNameA
IsBadWritePtr
SetFileApisToOEM
EnumResourceLanguagesW
InitAtomTable
ReadDirectoryChangesW
SetFileAttributesW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 27KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE