Static task
static1
Behavioral task
behavioral1
Sample
41bf8d6e51a67e331208f181ebfbdebe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41bf8d6e51a67e331208f181ebfbdebe.exe
Resource
win10v2004-20231222-en
General
-
Target
41bf8d6e51a67e331208f181ebfbdebe
-
Size
81KB
-
MD5
41bf8d6e51a67e331208f181ebfbdebe
-
SHA1
5fb208b49351f44310296757f6250fcaaf39ee1a
-
SHA256
50e3a3140e30dc1fadb58caed31679a3d1e0137953a72781e1654a147e2a6667
-
SHA512
9a36adc0446fe61a171c2eaf81eb27812938614a01ec6906a71882b9a4242e38363bc043f4f039d0ef53b394682b0d386d88182363ad4e8e92e5aeffd880cd84
-
SSDEEP
1536:jWKEmKGgr5gJjHAGE3S/AuUo2oVSFmnkrbuSxJd7zEvt/Puj:j3cTzpokYMuYJd7zit/Wj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41bf8d6e51a67e331208f181ebfbdebe
Files
-
41bf8d6e51a67e331208f181ebfbdebe.exe windows:4 windows x86 arch:x86
1e12f87d4a75988defebf38aa3e7f8b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
comctl32
ord17
shell32
SHFileOperationA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
ShellExecuteA
kernel32
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
SetFileTime
CompareFileTime
GetFileAttributesA
GetTempFileNameA
GetTempPathA
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
Sleep
GetSystemDirectoryA
SetEvent
CreateEventA
CopyFileA
GetFileSize
GetModuleFileNameA
GetUserDefaultLangID
lstrcpynA
GetCommandLineA
SetEnvironmentVariableA
GetTickCount
SetPriorityClass
CreateProcessA
CreateFileA
GetDiskFreeSpaceA
CreateThread
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetWindowsDirectoryA
CreateDirectoryA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
IsValidCodePage
GetOEMCP
GlobalAlloc
GetExitCodeProcess
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetPrivateProfileStringA
VirtualFree
HeapCreate
HeapDestroy
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetStringTypeW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetProcessHeap
HeapAlloc
HeapFree
GlobalFree
GetCurrentDirectoryA
SetCurrentDirectoryA
ExitProcess
WriteFile
ReadFile
SetFilePointer
MulDiv
lstrcatA
FindFirstFileA
lstrcpyA
FindNextFileA
FindClose
GetPrivateProfileIntA
lstrlenA
RemoveDirectoryA
SetFileAttributesA
lstrcmpiA
GetCPInfo
DeleteFileA
GetCurrentThread
GetLastError
LocalAlloc
LocalFree
CloseHandle
LoadLibraryA
FreeLibrary
GetVersionExA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
QueryPerformanceCounter
WritePrivateProfileStringA
GetACP
user32
LoadBitmapA
SendDlgItemMessageA
CharPrevA
EnableWindow
GetParent
EnumChildWindows
GetDlgItemTextA
GetDlgItem
GetWindowRect
SetWindowPos
CharNextA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
SetDlgItemTextA
PostQuitMessage
ShowWindow
SetForegroundWindow
FindWindowExA
IsWindowVisible
PeekMessageA
DispatchMessageA
ExitWindowsEx
SendMessageA
wsprintfA
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassA
SystemParametersInfoA
GetDesktopWindow
CreateWindowExA
DefWindowProcA
BeginPaint
GetClientRect
SetRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
SetFocus
EndDialog
IsWindowEnabled
SetClassLongA
DialogBoxParamA
IsWindow
ScreenToClient
gdi32
GetNearestColor
SetBkColor
GetStockObject
CreatePen
MoveToEx
LineTo
GetTextColor
CreateCompatibleDC
BitBlt
GetObjectA
CreateFontIndirectA
DeleteObject
CreateSolidBrush
CreateFontA
SetBkMode
SetTextColor
SelectObject
CreateBrushIndirect
advapi32
SetEntriesInAclA
RegEnumValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RevertToSelf
RegCreateKeyExA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ