Static task
static1
Behavioral task
behavioral1
Sample
4ec4c5b353792cfb03addbd61c779f64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ec4c5b353792cfb03addbd61c779f64.exe
Resource
win10v2004-20231215-en
General
-
Target
4ec4c5b353792cfb03addbd61c779f64
-
Size
236KB
-
MD5
4ec4c5b353792cfb03addbd61c779f64
-
SHA1
d37a45633a10352760c418fbedf2e3c3d1429177
-
SHA256
f8c1b5527b711312b64f5dbff4ed605fcad001063fa08225d2b859ad09ee212a
-
SHA512
be8aa145ddd7e4981fe9ee12d42e40f6de3fea5768bda64239cd07ac6121ef861de4de01077503559c93469f6b8149b68b91529f03ad1950486b5cdd1e0ed1d4
-
SSDEEP
6144:EVz4vPqWCHHKVD/gqba5liw10CdN+sdtbWB:EVzuCWMHsgqbal1Gsn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ec4c5b353792cfb03addbd61c779f64
Files
-
4ec4c5b353792cfb03addbd61c779f64.exe windows:4 windows x86 arch:x86
5ce188716bf436bebce17bcbc87b1ed0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetModuleFileNameA
CreateDirectoryA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrlenA
lstrcpyA
SetErrorMode
GetFileAttributesA
FindNextFileA
FindFirstFileA
lstrcatA
FindClose
GetCurrentDirectoryA
GetLocaleInfoW
SetEndOfFile
CopyFileA
SetFileAttributesA
lstrcmpA
GetDriveTypeA
SleepEx
GetLogicalDriveStringsA
GetVolumeInformationA
CreateProcessA
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetLastError
WriteFile
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
ReadFile
GetACP
GetOEMCP
CreateFileA
SetEnvironmentVariableA
user32
ExitWindowsEx
FindWindowA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uvnaogp Size: 84KB - Virtual size: 172KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE