Static task
static1
Behavioral task
behavioral1
Sample
4140c9a56cf0f62fc782d1920929e546.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4140c9a56cf0f62fc782d1920929e546.exe
Resource
win10v2004-20231215-en
General
-
Target
4140c9a56cf0f62fc782d1920929e546
-
Size
361KB
-
MD5
4140c9a56cf0f62fc782d1920929e546
-
SHA1
4df523d29cd2af21a09368df044db7366599eeb4
-
SHA256
3896b94b901d94e79b674868335fec036e007ec5f6fd3899c739443d8192e465
-
SHA512
972b59dcc519d2458e6598f9985fd7962f802d8a2dd2b83de91832f456af780a2b7942a1083aa111e3fa7d8278c33db2914aad042d4aa49b98fb422d8e515a92
-
SSDEEP
6144:LYcUIr+OXOBaU7iGYiJkaV2OFbC4XEqPTY/U1GvbYG+XtLETkzmo:LYcUZxgU7iGYiJkaC2fPTY/U8vbYj54O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4140c9a56cf0f62fc782d1920929e546
Files
-
4140c9a56cf0f62fc782d1920929e546.exe windows:4 windows x86 arch:x86
d8fbbfd561b090d32ca6a057677993eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
OpenMutexA
SetEvent
CreateMutexA
SearchPathA
CloseHandle
GetCommandLineA
FreeConsole
VirtualProtect
SetLastError
GetModuleHandleA
FindClose
Sleep
DeleteCriticalSection
GetVersionExW
GetTickCount
FindResourceExA
CreateThread
GetLastError
TlsGetValue
advapi32
LsaFreeMemory
FreeSid
LsaClose
OpenEventLogA
RegCloseKey
LsaSetSecret
IsValidSid
RegEnumKeyExA
RegLoadKeyA
GetFileSecurityA
CloseTrace
EqualSid
RegCreateKeyExA
CloseEventLog
RegCloseKey
loghours
DirSyncScheduleDialog
DialinHoursDialogEx
DialinHoursDialog
LogonScheduleDialog
DirSyncScheduleDialogEx
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ