Static task
static1
Behavioral task
behavioral1
Sample
41c448605cba7b01815a6dc048864404.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
41c448605cba7b01815a6dc048864404.exe
Resource
win10v2004-20231215-en
General
-
Target
41c448605cba7b01815a6dc048864404
-
Size
391KB
-
MD5
41c448605cba7b01815a6dc048864404
-
SHA1
3b20fccbb23afb7b5bae2a9492596b0005646bb5
-
SHA256
02df906c87c1dc78dff318fb60374e40b21312acb052ad8fccff481f3c71ffe0
-
SHA512
3314bf411e0dde1ad8673ea5d972ecf58f662cc1e113dbd6fd26d65489ce1c2dde7b3f2b60f421ad7c6d38a6577d20b94f9988fc38bcb034fb3a9fda51c84aaf
-
SSDEEP
12288:hzwXRM4HEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:6XRM4kAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41c448605cba7b01815a6dc048864404
Files
-
41c448605cba7b01815a6dc048864404.exe windows:4 windows x86 arch:x86
c6ca894f492b89ddfab6d7d13bee5b80
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
CreateEventW
LocalFree
WriteFile
GetPrivateProfileStringA
lstrlenW
LoadLibraryW
GetCurrentThreadId
GetCurrentProcessId
GetEnvironmentVariableW
GetDriveTypeA
InitializeCriticalSection
ReleaseMutex
ReleaseMutex
HeapCreate
IsBadStringPtrW
FindAtomA
GlobalFlags
GetFileTime
FindClose
user32
EndDialog
CreateWindowExA
DispatchMessageA
GetSysColor
GetSysColor
SetFocus
GetClassInfoA
IsWindow
GetClientRect
CallWindowProcW
DrawStateW
DrawTextA
GetKeyboardType
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ