Static task
static1
Behavioral task
behavioral1
Sample
4df4bdcdf739f7b650ef363e60fdc194.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4df4bdcdf739f7b650ef363e60fdc194.exe
Resource
win10v2004-20231222-en
General
-
Target
4df4bdcdf739f7b650ef363e60fdc194
-
Size
360KB
-
MD5
4df4bdcdf739f7b650ef363e60fdc194
-
SHA1
abb6c5069acdd0ddf7afc6bff64a42c3ff4a4083
-
SHA256
78d0a0c83e81d72acf768885fe427929a3af2e801334c0cb8c83860e37fa39ef
-
SHA512
4c4d24205f6e91a8e9724c2188291c4a981e9ff494d8a3f9987e8fae1cfac24b09e019ef291c0b58b5e76ee6939f3b113985977544ebfec2a3d45bd1e5bc728e
-
SSDEEP
3072:BeT4CZXoAAlHkqUv0DKKjOQFgf8HK5hXL1mj0LLu/IFaDadylovunSrh0:BeP+hd3qBkrFI8q5dLUjNIFgMHuSrq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4df4bdcdf739f7b650ef363e60fdc194
Files
-
4df4bdcdf739f7b650ef363e60fdc194.exe windows:4 windows x86 arch:x86
80d4a0058e6b6e781b66736a31a3bf6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetCurrentDirectoryA
GetLastError
CreateEventA
GetVersionExA
CloseHandle
FreeLibrary
ExitThread
WaitForSingleObject
GetCurrentThreadId
WaitForMultipleObjects
DeleteCriticalSection
ResetEvent
OpenEventA
LeaveCriticalSection
EnterCriticalSection
TerminateThread
SetEvent
CreateThread
GetProcAddress
LocalFree
LocalAlloc
GetSystemDirectoryA
OutputDebugStringA
GetModuleHandleA
lstrcmpiA
GetCommandLineA
lstrcatA
lstrcpyA
Sleep
FindClose
LoadLibraryA
GetPrivateProfileStringA
FindFirstFileA
GetShortPathNameA
DeleteFileA
CreateMutexA
SetFileAttributesA
GetFileAttributesA
GetPrivateProfileIntA
CreateProcessA
WritePrivateProfileStringA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
InitializeCriticalSection
WideCharToMultiByte
lstrlenA
GetModuleFileNameA
lstrlenW
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
FindNextFileA
GetCPInfo
SetConsoleCtrlHandler
VirtualAlloc
GetCurrentProcess
TerminateProcess
VirtualFree
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetVersion
GetStartupInfoA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
WriteFile
GetStdHandle
DebugBreak
HeapValidate
IsBadReadPtr
IsBadWritePtr
RtlUnwind
SetEnvironmentVariableA
user32
DestroyWindow
GetSystemMetrics
PostMessageA
DispatchMessageA
PeekMessageA
DefWindowProcA
SetTimer
KillTimer
CharNextA
FindWindowA
MessageBoxA
CreateWindowExA
ShowWindow
RegisterClassExA
LoadStringA
UnregisterClassA
GetMessageA
TranslateMessage
PostQuitMessage
advapi32
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoDisconnectObject
CoRevokeClassObject
CoCreateInstance
CoGetClassObject
CoUninitialize
CoInitialize
CoRegisterClassObject
oleaut32
VariantInit
SysAllocString
VariantClear
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
CreateStdDispatch
SysStringLen
SysAllocStringLen
SysFreeString
wininet
InternetQueryOptionA
Sections
.text Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ