Static task
static1
Behavioral task
behavioral1
Sample
4cb9c52d9e16f0517e95c82a1adbf918.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cb9c52d9e16f0517e95c82a1adbf918.exe
Resource
win10v2004-20231215-en
General
-
Target
4cb9c52d9e16f0517e95c82a1adbf918
-
Size
992KB
-
MD5
4cb9c52d9e16f0517e95c82a1adbf918
-
SHA1
f638c6ddd4ea7b9f07b98ebcfa5820e8a9f01712
-
SHA256
ee85c7c9a328dfd4ca2e0b7984c7cf05958038c8b78152dd46ab9a742584ea91
-
SHA512
54d62f7c4d7f6a1047af987aab1f159d082b41a422d392b8370fe5d12a1e978425549639168fef6b78112660ad20c28196d24a7aa0d833c937418c344e0eff49
-
SSDEEP
12288:eCd30NAt7btw+x3DC629r/AARVCTSuibiQvO8zNs5lzFMUybeHT5k:BdENAZxwiCXr/AARu1QW8zC5xqUpze
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cb9c52d9e16f0517e95c82a1adbf918
Files
-
4cb9c52d9e16f0517e95c82a1adbf918.exe windows:4 windows x86 arch:x86
b59594dfc068d58636c83d19481c521f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetLocalTime
GetProcAddress
LoadLibraryA
SetStdHandle
SetFilePointer
GetLocaleInfoA
GetSystemInfo
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
DebugBreak
RaiseException
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
GetProcessHeap
CloseHandle
FreeLibrary
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
SetConsoleCtrlHandler
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
VirtualProtect
FlushFileBuffers
user32
MessageBoxW
oleaut32
SysAllocStringByteLen
Sections
.rda1273 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE