Relocations
Static task
static1
Behavioral task
behavioral1
Sample
4079edd4471737b9b3a69d47fa989967.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4079edd4471737b9b3a69d47fa989967.exe
Resource
win10v2004-20231215-en
General
-
Target
4079edd4471737b9b3a69d47fa989967
-
Size
40KB
-
MD5
4079edd4471737b9b3a69d47fa989967
-
SHA1
383388df738075785a845b5383f82f691466717a
-
SHA256
06c8710803db5776bcef1e4f603bf32872686251a1ca3b05330f113089246488
-
SHA512
ccae857bcae556af6f092e96df76dee04842c8fbef13cc6d74fdb9344952ec378edbbba058ae6c8343b7d9f52f919367197d3457339499163af626135068523b
-
SSDEEP
384:WQWuCmNCdZr7ieR3o3q2auWHxBMT1EohCiZtGt4AR+SnEUV/wQEPHpP/XWe2VZoq:DWNm8f7ieR43KVFektnd4QEPHMewx8y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4079edd4471737b9b3a69d47fa989967
Files
-
4079edd4471737b9b3a69d47fa989967.exe windows:4 windows x86 arch:x86
ea60c7a754a106f666ffea672a763864
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
CloseHandle
CreateFileMappingW
CreateFileW
CreateSemaphoreA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetCurrentThread
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoA
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
MapViewOfFile
ReleaseSemaphore
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualQuery
WaitForSingleObject
lstrcatW
lstrcpyW
lstrlenW
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memset
signal
strcmp
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 73B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ