?_GetCaretBlinkTime@@YGPAX_KDI@Z
Static task
static1
Behavioral task
behavioral1
Sample
4ffcfae2f34f853cc988a63c1773ce6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ffcfae2f34f853cc988a63c1773ce6f.exe
Resource
win10v2004-20231215-en
General
-
Target
4ffcfae2f34f853cc988a63c1773ce6f
-
Size
88KB
-
MD5
4ffcfae2f34f853cc988a63c1773ce6f
-
SHA1
f72aa7bcc683339cea530092a6f6796fa6ce9cad
-
SHA256
e8eefd8f7e81bbfa6e952e17c74fdb8ce00e498d685cff20314fcc2b68e9dce0
-
SHA512
9a08d1ba1dc7457975f247d13fff55d00934e11dbc88d9b7a8c0aa76041a1563cf23f9442ac40b404e93c4aa25b109c85dec6ee5657e82e3c9982790782e78db
-
SSDEEP
1536:PrcCnf2bLzRNmUFFU1Pu20YSL/LwowFhHo13Z8Cx7Lw2DkPoYzQmU:Yeynmu20YQLw9hItZB1w2DkPWmU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ffcfae2f34f853cc988a63c1773ce6f
Files
-
4ffcfae2f34f853cc988a63c1773ce6f.exe windows:5 windows x86 arch:x86
e20bb4b67e207a536d73cb11bccbbf74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCmpNIA
PathCanonicalizeA
StrRChrA
ord158
ChrCmpIW
PathFindFileNameW
shell32
SHCreateQueryCancelAutoPlayMoniker
kernel32
CreateMailslotA
GetCommConfig
CopyFileA
CreateFileMappingA
FileTimeToDosDateTime
OpenJobObjectA
GetDllDirectoryW
GlobalFlags
lstrcatW
GetHandleInformation
CreateTapePartition
TransmitCommChar
GetCommMask
OpenFileMappingW
lstrcpyA
CreateWaitableTimerW
OpenEventA
LoadLibraryExW
FlushFileBuffers
user32
SetScrollRange
EnumDisplaySettingsA
CallNextHookEx
AttachThreadInput
ChangeMenuA
DefDlgProcW
OpenDesktopA
GetDoubleClickTime
GetMonitorInfoA
SetPropW
GetKeyboardLayoutNameW
SetWindowContextHelpId
GetMenuStringA
CreatePopupMenu
IsDlgButtonChecked
SetCaretPos
SetWindowTextW
SendMessageCallbackA
LoadBitmapA
DestroyIcon
gdi32
ExtSelectClipRgn
Polyline
GetEnhMetaFilePaletteEntries
GetPath
CreateDiscardableBitmap
FixBrushOrgEx
SetTextJustification
GetTextAlign
GetPaletteEntries
CreateMetaFileA
GetCurrentObject
CreateEnhMetaFileW
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m_data Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MData Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c_data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n_data Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ