Static task
static1
Behavioral task
behavioral1
Sample
4461ca63225c34aeb5c82e4ba299caae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4461ca63225c34aeb5c82e4ba299caae.exe
Resource
win10v2004-20231222-en
General
-
Target
4461ca63225c34aeb5c82e4ba299caae
-
Size
10KB
-
MD5
4461ca63225c34aeb5c82e4ba299caae
-
SHA1
7b4ee967191f714d434d83e5bb7feb9d2c3052f8
-
SHA256
f943d4413b0ccb016518646e60b508f60adff736fe19822998c226a6163b758c
-
SHA512
10f0387b43fa93304e2ee39b13f70e9f7f7f78ce840ebcc483e6928e21e850fe84272cc34165e4eb59107996f58b3a563cc2f119ffbaff268c594558950baf23
-
SSDEEP
192:se7hZ97CvtB/5nwXfnzhlPffPjKBiZjqnnnnnnnnnnnnnnnnD:se7hv7cB/52zhlzKBiZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4461ca63225c34aeb5c82e4ba299caae
Files
-
4461ca63225c34aeb5c82e4ba299caae.exe windows:4 windows x86 arch:x86
e3db3cbb0e8271e5e19e65c079be5bca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateMutexA
ExitProcess
GetComputerNameA
GetCurrentProcess
GetCurrentThread
GetEnvironmentVariableA
GetExitCodeProcess
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetThreadContext
GetVersionExA
GetVolumeInformationA
OpenMutexA
ResumeThread
SetFileAttributesA
SetPriorityClass
SetThreadPriority
VirtualAlloc
VirtualAllocEx
VirtualFree
lstrcatA
lstrcpyA
lstrlenA
shell32
ShellExecuteExA
SHChangeNotify
wininet
InternetGetConnectedState
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE