Static task
static1
Behavioral task
behavioral1
Sample
43884a6de4b751f848f0c62422d606d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43884a6de4b751f848f0c62422d606d0.exe
Resource
win10v2004-20231215-en
General
-
Target
43884a6de4b751f848f0c62422d606d0.exe
-
Size
2.5MB
-
MD5
43884a6de4b751f848f0c62422d606d0
-
SHA1
a7c2a9a6f58e67c4b2e12a42f77a355618f2d5a3
-
SHA256
ea07e8062d246770a4e005383f07009ea465801f429ebedf6e4fc0667ec143b1
-
SHA512
d48e0ea68e21c04b16730f93f7e7be76e8aff83ae2649f88857fd3aab50298a7d13640daf2e36b187e825c784bae9debe674b3e4be6f1a29a7ff67bc7c633040
-
SSDEEP
49152:stqTECILQEMLlqYuJoqbi/OdO/FFYASLAUQrCnod7aQb4Ay:sKopYuJRbi/5nllH4V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43884a6de4b751f848f0c62422d606d0.exe
Files
-
43884a6de4b751f848f0c62422d606d0.exe.exe windows:6 windows x86 arch:x86
867b839a485416f7b25fec57447214a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GlobalAlloc
lstrcpyA
CloseHandle
SetFileAttributesA
GlobalLock
ExitProcess
CopyFileA
GlobalUnlock
HeapSize
SetEndOfFile
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
Sleep
WaitForSingleObject
CreateMutexA
GetModuleFileNameW
GetCurrentProcess
CreateDirectoryA
GetModuleFileNameA
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetTempPathW
GetStdHandle
WriteFile
GetFileSizeEx
SetFilePointerEx
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapFree
HeapAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DeleteFileW
HeapReAlloc
GetFileAttributesExW
CreateFileW
ReadFile
ReadConsoleW
FindClose
FindFirstFileExW
WriteConsoleW
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetClipboardData
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
advapi32
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
GetTokenInformation
RegCloseKey
shell32
ShellExecuteExW
SHGetKnownFolderPath
ShellExecuteA
ole32
CoTaskMemFree
Sections
.text Size: - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmpȤ Size: - Virtual size: 962KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmpȤ Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmpȤ Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 176KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ