Static task
static1
Behavioral task
behavioral1
Sample
4381c176192177167410b61fb24fb693.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4381c176192177167410b61fb24fb693.exe
Resource
win10v2004-20231222-en
General
-
Target
4381c176192177167410b61fb24fb693
-
Size
453KB
-
MD5
4381c176192177167410b61fb24fb693
-
SHA1
73a34b94e52c86ca8189ecc794fec358349312d5
-
SHA256
9bc737a10dbdfd20b388cfb7cf333a252993a55dbf0356c12eacad149cbf057c
-
SHA512
e134853ebdfd12c79838f425fba91b3f6712139a6cab9fb539273ad186e2bc73d948a4e0912a6856ba808da8a4493789124220265bca356086ea857004b7047c
-
SSDEEP
12288:ASfYZWjfcI/tvTrY9a3oiF76B0Z1qP3S2:HfYsvlSrip6B0Z4P3S2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4381c176192177167410b61fb24fb693
Files
-
4381c176192177167410b61fb24fb693.exe windows:5 windows x86 arch:x86
a8f29cd51bcaf655e660286f12ddaa15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
strncpy
sprintf
wcscpy
wcsncpy
memmove
wcschr
wcslen
free
malloc
_initterm
_adjust_fdiv
kernel32
GetTempFileNameW
LoadLibraryA
MoveFileA
GetFileAttributesA
FileTimeToDosDateTime
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpyW
CloseHandle
LocalFree
SetEvent
Sleep
InterlockedExchange
InterlockedCompareExchange
GetLastError
LocalAlloc
VerifyVersionInfoW
SetFileAttributesA
CreateEventW
WaitForSingleObject
ReleaseMutex
WaitForMultipleObjects
GetTickCount
SetThreadPriority
GetCurrentThread
CreateThread
GetCurrentThreadId
SetLastError
lstrlenW
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
CompareStringW
lstrcmpiW
lstrcatW
DeleteFileW
CreateFileW
WriteFile
ReadFile
SetFileTime
MoveFileW
SetEndOfFile
GetFileSize
SetFilePointer
GetVolumeInformationW
FindClose
FindFirstFileW
MultiByteToWideChar
RaiseException
GetDriveTypeW
GetEnvironmentVariableW
OutputDebugStringA
GetDiskFreeSpaceA
lstrcatA
GetWindowsDirectoryA
GlobalFree
OutputDebugStringW
CreateMutexW
GetCurrentProcess
ProcessIdToSessionId
GetCurrentProcessId
DuplicateHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedIncrement
CreateFileA
InterlockedDecrement
DeviceIoControl
DeleteFileA
lstrcpyA
user32
GetMenu
wvsprintfA
MessageBoxA
CloseDesktop
wsprintfA
wsprintfW
MsgWaitForMultipleObjects
SetThreadDesktop
UnregisterClassW
CheckMenuItem
DefWindowProcW
PostQuitMessage
DestroyWindow
advapi32
RegDeleteValueW
RegQueryValueExA
OpenThreadToken
RevertToSelf
SetThreadToken
OpenProcessToken
DuplicateToken
GetTokenInformation
RegCreateKeyExW
GetLengthSid
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
GetFileSecurityW
GetUserNameA
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyExA
Sections
0 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 1024B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ