Static task
static1
Behavioral task
behavioral1
Sample
41f4c0ccd58d5cd6156f6a284fc50a59.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41f4c0ccd58d5cd6156f6a284fc50a59.exe
Resource
win10v2004-20231215-en
General
-
Target
41f4c0ccd58d5cd6156f6a284fc50a59
-
Size
44KB
-
MD5
41f4c0ccd58d5cd6156f6a284fc50a59
-
SHA1
e2fd2d82f28c3ef37669e56fa2c46e88ae1cc174
-
SHA256
573a7e58a24941682cc1e506fe4d7fd713db68ed3dae698638b5e933038443bb
-
SHA512
3f0038675013ab0cc8be4cf430235bd843465443db8414e8785513149c7ffc54d8d70ce81f627073507b7756a94f5c1211f1e74a43694ab62bf4b363a83da498
-
SSDEEP
768:qK1qW+th2rRSVEUipaQtOUHsKjltV7ErbEoi:qK1QgrgVVkal4toi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41f4c0ccd58d5cd6156f6a284fc50a59
Files
-
41f4c0ccd58d5cd6156f6a284fc50a59.exe windows:4 windows x86 arch:x86
54f1c92101255a847d3ca1cff61937a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
VirtualProtectEx
VirtualAllocEx
WriteProcessMemory
DeleteFileA
GetTempFileNameA
GetTempPathA
GetWindowsDirectoryA
SetThreadContext
ResumeThread
TerminateProcess
GetStartupInfoA
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAlloc
VirtualQueryEx
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
advapi32
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE