Static task
static1
Behavioral task
behavioral1
Sample
4043d28293067c4f1b20ecfccc8cd0d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4043d28293067c4f1b20ecfccc8cd0d3.exe
Resource
win10v2004-20231215-en
General
-
Target
4043d28293067c4f1b20ecfccc8cd0d3
-
Size
108KB
-
MD5
4043d28293067c4f1b20ecfccc8cd0d3
-
SHA1
9b287ee58ba2c4c50989d7d420ead24ceb500115
-
SHA256
a6a626c135b78942e444f129b96a3c1b4de67ad8db3771259e47718473215346
-
SHA512
86dbd2e1a65f26848313d908acbe824e490a519fbe9133cc18be22a30fa1e9cc9628fb2cc1c667b5c9cea468e1eff5e8a34b1349ff3202aee552f02eb8fbf168
-
SSDEEP
1536:az/wPdIj3a/RwaOYCXJoMa978xTi6tamj1Tcox3PuNiqA:fP63qRwadwv4mpTPPuNz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4043d28293067c4f1b20ecfccc8cd0d3
Files
-
4043d28293067c4f1b20ecfccc8cd0d3.exe windows:4 windows x86 arch:x86
2be2151b709797ba9eeef879c04f51b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3663
ord825
ord823
ord800
ord665
ord353
ord1187
ord535
ord1871
ord939
ord2818
ord858
ord537
ord540
ord6663
ord4202
ord860
ord1979
ord5442
ord5186
ord354
ord4129
ord4204
ord5710
ord6883
ord533
ord5194
ord5465
ord940
ord6407
ord6010
ord1997
ord798
ord1168
ord356
ord2770
ord1980
ord668
ord1105
ord6383
ord5440
ord6394
ord5450
ord1567
ord3318
ord268
ord2393
ord5861
ord6143
ord541
ord801
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
srand
rand
atoi
_ftol
memmove
_mbscmp
time
strrchr
isdigit
_mbsstr
_stricmp
sprintf
strlen
calloc
free
memcmp
memcpy
_CxxThrowException
_mbstok
_mbsnbcat
wcscpy
mbstowcs
getenv
_splitpath
_ltoa
_itoa
wcstombs
strcat
vsprintf
strncpy
_fcvt
strcpy
__CxxFrameHandler
memset
_initterm
_strnicmp
kernel32
lstrcpyA
GetVersionExA
DeleteFileA
GetTickCount
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetSystemDirectoryA
WaitForSingleObject
SetEvent
Sleep
CreateEventA
SetFilePointer
WriteFile
SetEndOfFile
SetFileTime
GetFileTime
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
MoveFileExA
CopyFileA
GetWindowsDirectoryA
CreateFileA
GetFileSize
CloseHandle
GlobalAlloc
ReadFile
GlobalFree
CreateMutexA
VirtualQueryEx
GetThreadContext
CreateProcessA
GetModuleHandleA
VirtualAlloc
TerminateThread
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
GetCurrentThread
LockResource
LoadResource
FindResourceA
FindClose
FindFirstFileA
CreateThread
LoadLibraryExA
DeviceIoControl
GetShortPathNameA
GetEnvironmentVariableA
GetLastError
lstrcatA
ResumeThread
CreateDirectoryA
SystemTimeToFileTime
LocalFileTimeToFileTime
user32
wsprintfA
advapi32
CreateServiceA
ControlService
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
OpenServiceA
OpenSCManagerA
GetUserNameA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
DeleteService
QueryServiceConfigA
ole32
CoCreateGuid
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.svx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ