Static task
static1
Behavioral task
behavioral1
Sample
41957f63a86cfa06b13f0209a5f37548.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41957f63a86cfa06b13f0209a5f37548.exe
Resource
win10v2004-20231215-en
General
-
Target
41957f63a86cfa06b13f0209a5f37548
-
Size
242KB
-
MD5
41957f63a86cfa06b13f0209a5f37548
-
SHA1
95de0daea4335be2d771d12a10309872f9d62a26
-
SHA256
cff8852b48c3f60725d6775d663b166ca9ea28ed0b30cf09d974ea78d211bcb8
-
SHA512
47e7492d98f19f069b375bf8472979b13c19a4e249fec143ade28f8d6478b94ff447dcbe197dac30a39e9d8e52f690d5803c86c9fd3bf99414add57c2491d3ea
-
SSDEEP
6144:tUt4l4twApcJXe4l+6nqQvAOJXmhu6JyQDoMIw/yPX:/l4twApcJXe4lfnyOZOufOoMRy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41957f63a86cfa06b13f0209a5f37548
Files
-
41957f63a86cfa06b13f0209a5f37548.exe windows:4 windows x86 arch:x86
b054aefcee84a7767f103c05654c168c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenW
GetVersionExA
IsBadHugeReadPtr
GetLastError
LoadLibraryExA
GlobalAlloc
GetCommandLineW
GetCommandLineA
LoadLibraryA
GetProcAddress
LocalAlloc
ExitProcess
VirtualAlloc
GetModuleHandleA
user32
CharUpperBuffA
SystemParametersInfoA
SendMessageA
GetKeyState
GetKeyNameTextA
IsWindowEnabled
EndPaint
SetFocus
RedrawWindow
MessageBeep
GetWindowDC
GetKeyboardState
EnableWindow
DefFrameProcA
RegisterClipboardFormatA
KillTimer
MapVirtualKeyA
GetDC
InvalidateRect
CreateIcon
ReleaseDC
GetSubMenu
GetKeyboardLayout
GetWindowThreadProcessId
GetMessagePos
TranslateMDISysAccel
EnumThreadWindows
CreateMenu
GetMenuItemID
IsWindow
MessageBoxA
AdjustWindowRectEx
SetForegroundWindow
GetSystemMetrics
MoveWindow
CharToOemA
IsZoomed
IsWindowUnicode
GetMenuItemInfoA
SetTimer
FindWindowA
PostQuitMessage
GetSystemMenu
GetTopWindow
DrawMenuBar
GetClassLongA
GetKeyboardLayoutList
GetCursorPos
GetSysColorBrush
GetActiveWindow
GetWindowLongA
GetScrollPos
DrawIcon
DefMDIChildProcA
LoadIconA
ShowScrollBar
SetWindowTextA
GetMenuItemCount
SetWindowPos
CallNextHookEx
SendMessageW
LoadCursorA
SetPropA
GetParent
PeekMessageA
EnumWindows
SetClassLongA
CreateWindowExA
UpdateWindow
UnhookWindowsHookEx
IsChild
SetScrollRange
DefWindowProcA
GetIconInfo
GetMenuState
GetDlgItem
EnableScrollBar
OpenClipboard
EmptyClipboard
GetMenuStringA
IsRectEmpty
shlwapi
SHGetValueA
SHQueryValueExA
SHStrDupA
PathFileExistsA
SHDeleteValueA
PathIsContentTypeA
oleaut32
SafeArrayPtrOfIndex
SafeArrayGetElement
Sections
CODE Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES8 Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES6 Size: 1024B - Virtual size: 934B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES5 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES3 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ