Static task
static1
Behavioral task
behavioral1
Sample
44475d30c86aed77880c8eb9af1a5b67.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44475d30c86aed77880c8eb9af1a5b67.exe
Resource
win10v2004-20231215-en
General
-
Target
44475d30c86aed77880c8eb9af1a5b67
-
Size
364KB
-
MD5
44475d30c86aed77880c8eb9af1a5b67
-
SHA1
d4da5ab3371e8785eef2daf6197fb74431084512
-
SHA256
48bb46a95975c3af29a0c95e78d55e1f0798ce03cce0a9754d95194be62ee1f0
-
SHA512
d6dc9b019ba2bd74b8b153a94a329749f20c56cc4254041a8fec2278450a76e25b2f3256d67fd3549c367b7e6ab1621e2af234b5937f8dbaaf11d88064e1f55c
-
SSDEEP
6144:8wwfGBvA+j+4CnpCxAE0KPn7dB9Wc7V6qLJIg8ukjODlGzfcdc+pvsCojHViEosq:8wwA5j3CcxR0e7Uc7MOJIP1WGzUdNiCv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44475d30c86aed77880c8eb9af1a5b67
Files
-
44475d30c86aed77880c8eb9af1a5b67.exe windows:4 windows x86 arch:x86
b05154a8a8d4adacdd9aa017f92b4fae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetTickCount
FindClose
GetACP
TlsGetValue
CreateProcessA
GetModuleHandleA
ReleaseMutex
GlobalUnlock
HeapCreate
GlobalFree
PulseEvent
SetLastError
CreateFileA
LoadLibraryA
CreateMutexA
FindResourceA
GetEnvironmentVariableA
ExitThread
DeleteAtom
user32
GetDC
IsWindow
DispatchMessageA
DrawEdge
GetDlgItem
CopyRect
DefWindowProcW
SetFocus
GetIconInfo
DrawMenuBar
CheckRadioButton
FillRect
CallWindowProcA
msasn1
ASN1BERDecNull
ASN1BEREncEoid
ASN1BERDecCheck
ASN1BERDecBool
ASN1BEREncBool
dpnet
DirectPlay8Create
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ