Static task
static1
Behavioral task
behavioral1
Sample
4c4cc51fc995a5652fc436c68edc2bdddf0024b36643a6df348341269a184f8a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c4cc51fc995a5652fc436c68edc2bdddf0024b36643a6df348341269a184f8a.exe
Resource
win10v2004-20231215-en
General
-
Target
4c4cc51fc995a5652fc436c68edc2bdddf0024b36643a6df348341269a184f8a
-
Size
12KB
-
MD5
fa30ece26427b5419fafe92d75636302
-
SHA1
c7e5b7c190a145d2a0870f79782634b20765dd4d
-
SHA256
4c4cc51fc995a5652fc436c68edc2bdddf0024b36643a6df348341269a184f8a
-
SHA512
8ceffadb897e9a6cb344763c3ae4a6bfa68c29ab0f344c458e400d41c23ab4e6aed2cff947309f979bf7486ae9eb80596d2ad08c07830df49efadf0ac4bc86bd
-
SSDEEP
192:U00575NfsigpFUQ9d5smkEIAmfqLi9DDk3EAG91EZ56Nq:o5N/g8Q9damF9mWi9Xk3ENEZi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c4cc51fc995a5652fc436c68edc2bdddf0024b36643a6df348341269a184f8a
Files
-
4c4cc51fc995a5652fc436c68edc2bdddf0024b36643a6df348341269a184f8a.exe windows:5 windows x86 arch:x86
334fd5d5fc72b4fa4cb0e36a35f4f041
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
qt5core
??0QMessageLogger@@QAE@PBDH0@Z
??6QDebug@@QAEAAV0@PBD@Z
??1QDebug@@QAE@XZ
?instance@QPluginLoader@@QAEPAVQObject@@XZ
??1QPluginLoader@@UAE@XZ
??0QPluginLoader@@QAE@ABVQString@@PAVQObject@@@Z
?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ
?fromUtf8@QString@@SA?AV1@PBDH@Z
?append@QString@@QAEAAV1@ABV1@@Z
??1QString@@QAE@XZ
??0QString@@QAE@ABV0@@Z
?debug@QMessageLogger@@QBE?AVQDebug@@XZ
qt5widgets
?staticMetaObject@QWidget@@2UQMetaObject@@B
??0QApplication@@QAE@AAHPAPADH@Z
??1QApplication@@UAE@XZ
msvcp120
?_Syserror_map@std@@YAPBDH@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
msvcr120
memmove
__dllonexit
_onexit
??1type_info@@UAE@XZ
_unlock
__crtGetShowWindowMode
strlen
memcpy
??_V@YAXPAX@Z
_lock
__CxxFrameHandler3
_CxxThrowException
_XcptFilter
_purecall
??2@YAPAXI@Z
_calloc_crt
_controlfp_s
_invoke_watson
__crtSetUnhandledExceptionFilter
?terminate@@YAXXZ
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_except_handler4_common
_commode
_fmode
_acmdln
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
??3@YAXPAX@Z
kernel32
WideCharToMultiByte
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCommandLineW
LocalFree
EncodePointer
shell32
CommandLineToArgvW
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ