Static task
static1
Behavioral task
behavioral1
Sample
43013b856442aa25d093dd12a1ca7740.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
43013b856442aa25d093dd12a1ca7740.exe
Resource
win10v2004-20231222-en
General
-
Target
43013b856442aa25d093dd12a1ca7740
-
Size
198KB
-
MD5
43013b856442aa25d093dd12a1ca7740
-
SHA1
75e531a3fa7a1ec195dc59cad41ce8c56fe326ae
-
SHA256
4d9360c2aa5db0808d491dadfdf7d713a15729d650afd1004eff7a03959229c0
-
SHA512
bb25121241930eea32d4b558d45467cd7999a424675014a0be71d3ba3d6feb1ea6d9084b1d48183e84f7f4fc778de0175032f0659fad1fc7eee0e7e88f7aefa4
-
SSDEEP
1536:DB7TXUpI7vFemSAAepydSNrPP0MD6YtU1LYwqLYu2RvJ/jiuwc7I0Gp+m7EL9NMN:hENmSAx9rPP0MD3ULVhu2RB/7LGO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43013b856442aa25d093dd12a1ca7740
Files
-
43013b856442aa25d093dd12a1ca7740.exe windows:4 windows x86 arch:x86
de15eaaf02f301c8f6534ca68541a564
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyW
GetSystemDirectoryW
GetCurrentThreadId
GetLocalTime
Module32FirstW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetVersionExW
lstrcmpA
GetSystemTimeAsFileTime
GetVolumeInformationA
GetDriveTypeA
HeapAlloc
GetProcessHeap
HeapFree
GetLongPathNameW
GetTempPathW
WaitForSingleObject
CreateFileW
CreateProcessW
CopyFileW
GetModuleFileNameW
GetModuleHandleW
CreateMutexW
ReadFile
SetFilePointer
GetFileSize
ExitThread
ResumeThread
CreateThread
ExitProcess
GetTickCount
QueryPerformanceCounter
HeapSize
LCMapStringW
LCMapStringA
GetSystemInfo
GetTempFileNameW
DeleteFileW
MoveFileW
Sleep
lstrlenW
lstrcatW
WriteFile
CloseHandle
LoadLibraryA
GetProcAddress
GetLastError
VirtualProtect
GetLocaleInfoA
VirtualQuery
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcessId
user32
SetSysColors
SystemParametersInfoW
wvsprintfW
wsprintfW
advapi32
RegCreateKeyW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
rpcrt4
RpcStringFreeW
UuidToStringW
UuidCreate
wininet
HttpQueryInfoA
InternetOpenUrlW
InternetGetCookieExW
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
HttpQueryInfoW
InternetQueryOptionW
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ