Static task
static1
Behavioral task
behavioral1
Sample
41e57348f3fe40a837478e65beb44c3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41e57348f3fe40a837478e65beb44c3f.exe
Resource
win10v2004-20231215-en
General
-
Target
41e57348f3fe40a837478e65beb44c3f
-
Size
540KB
-
MD5
41e57348f3fe40a837478e65beb44c3f
-
SHA1
c38e672bf0591be13f3dd976063dacab449e574e
-
SHA256
23189f3f8ddea7ac3e8d3361561f1fd1e95065419d4bbbcf9b1c28f9ef344ebc
-
SHA512
a68d975f3b75bda7f1865c27122a18edea29cd663039c9a57f08d0ded76d3d45f366c99a80c7e635e94e7b670ae7d2f9b545834c496d4720e8564eba0efa89db
-
SSDEEP
12288:bmr4BvCd1iBkxphgMV74cVyL3NfzNtM7DEKHyAcCQ:ar4tCdbphgBzNfzNkyVd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41e57348f3fe40a837478e65beb44c3f
Files
-
41e57348f3fe40a837478e65beb44c3f.exe windows:4 windows x86 arch:x86
bfff3861e3065e21450a60b71243d623
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetOEMCP
TerminateProcess
OpenMutexA
VirtualAlloc
FlushFileBuffers
CloseHandle
CompareStringW
FreeEnvironmentStringsA
GetFullPathNameW
GetEnvironmentStringsW
InterlockedIncrement
GetPrivateProfileStringW
GetCurrentProcess
GetProfileIntA
QueryPerformanceCounter
ReadFile
LCMapStringW
WriteFile
SetFilePointer
MultiByteToWideChar
TryEnterCriticalSection
TlsFree
LocalSize
TlsGetValue
InterlockedDecrement
OutputDebugStringW
GetNamedPipeInfo
SetStdHandle
GetSystemTimeAsFileTime
RtlUnwind
GetSystemInfo
GetTimeZoneInformation
GetCommandLineA
lstrcpyn
GetStdHandle
GetUserDefaultLCID
SystemTimeToTzSpecificLocalTime
TlsSetValue
GetProcAddress
LoadLibraryA
GetNumberFormatW
SetLastError
VirtualQuery
LeaveCriticalSection
GetSystemTime
LocalFree
CompareStringA
HeapReAlloc
CreateDirectoryExW
HeapAlloc
HeapCreate
GetModuleFileNameA
VirtualFree
GetCurrencyFormatW
GetNumberFormatA
GetStringTypeA
IsBadWritePtr
SetHandleCount
GetStartupInfoA
TlsAlloc
SetThreadContext
CreateMutexA
GetEnvironmentStrings
GetLocalTime
FreeEnvironmentStringsW
GetACP
CreateSemaphoreA
GetEnvironmentVariableA
InterlockedExchange
GetModuleHandleA
DeleteCriticalSection
GetTickCount
EnterCriticalSection
OpenProcess
InitializeCriticalSection
LCMapStringA
SetEnvironmentVariableA
GetVersion
GetProcessShutdownParameters
GetCurrentThreadId
SetLocaleInfoW
GetCurrentProcessId
UnhandledExceptionFilter
GetCPInfo
EnumDateFormatsA
ExitProcess
GetConsoleOutputCP
GetCurrentThread
CreateWaitableTimerW
HeapFree
HeapDestroy
EnumResourceTypesA
TransactNamedPipe
IsValidLocale
GetStringTypeW
GetFileType
WideCharToMultiByte
comdlg32
LoadAlterBitmap
ChooseFontA
wininet
InternetConnectA
FindNextUrlCacheContainerW
FtpFindFirstFileW
GetUrlCacheEntryInfoW
InternetConfirmZoneCrossingW
InternetOpenUrlA
HttpEndRequestW
HttpAddRequestHeadersW
GopherGetLocatorTypeA
shell32
SheChangeDirA
SHQueryRecycleBinA
comctl32
ImageList_BeginDrag
DrawStatusTextW
CreatePropertySheetPage
ImageList_DrawIndirect
ImageList_Merge
ImageList_DragLeave
InitCommonControlsEx
ImageList_GetIconSize
ImageList_SetDragCursorImage
user32
SwitchToThisWindow
RegisterClassExA
EnumDesktopsA
EnumDisplaySettingsW
DrawTextA
LockWindowUpdate
GetTitleBarInfo
UnregisterHotKey
GetUserObjectInformationW
GetKeyState
RemovePropW
MessageBoxA
RegisterClassA
CharPrevW
MessageBoxW
GetPropW
GetSysColorBrush
GetFocus
SetScrollRange
OpenClipboard
SystemParametersInfoW
CreateCursor
CreateDialogIndirectParamW
GetWindowLongW
GetClassInfoA
ScreenToClient
GetPropA
CloseClipboard
Sections
.text Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ