Static task
static1
Behavioral task
behavioral1
Sample
45675ca59a136bbd83aa88a1d36a0304.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45675ca59a136bbd83aa88a1d36a0304.exe
Resource
win10v2004-20231215-en
General
-
Target
45675ca59a136bbd83aa88a1d36a0304
-
Size
691KB
-
MD5
45675ca59a136bbd83aa88a1d36a0304
-
SHA1
13c34e0cb41c9d6340ec96aeb91d0d668e5fc5b2
-
SHA256
4f5cb3dae5b6bec8102c39f83bd78b64b666a38eb7fca54d0a80a74300ca5c65
-
SHA512
321138143ad5a8ce2161e5b7012038f4ded8536f48b9548f1035bd43377c8123dd1ff656089196c263983645d7cc0963792383d3bd308decdae82197766b34ef
-
SSDEEP
12288:MI+E0AP1y/zQpJKhfyHcS3m12s5dwxzESV8Cf6KhRZoE:v+E0L/zQ6g8imks5mpESH6an
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45675ca59a136bbd83aa88a1d36a0304
Files
-
45675ca59a136bbd83aa88a1d36a0304.exe windows:4 windows x86 arch:x86
60dfa90b11bfed466b440537e4777ece
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
advapi32
ReportEventW
RegDeleteKeyA
LookupPrivilegeNameA
CryptSetHashParam
LookupAccountSidA
CryptHashSessionKey
CryptSetProviderExW
GetUserNameW
CryptSetProviderA
CryptHashData
CryptContextAddRef
RegOpenKeyExW
LookupSecurityDescriptorPartsA
LogonUserA
InitializeSecurityDescriptor
AbortSystemShutdownA
CryptEnumProviderTypesW
RegCloseKey
RegQueryInfoKeyW
CryptImportKey
AbortSystemShutdownW
CryptGenRandom
InitiateSystemShutdownA
kernel32
RtlUnwind
OpenMutexA
WideCharToMultiByte
TlsAlloc
VirtualAlloc
GetTickCount
DeleteCriticalSection
LoadLibraryW
RaiseException
SetEnvironmentVariableA
CompareStringA
DebugActiveProcess
FreeLibrary
GetCommandLineA
GetProcAddress
LCMapStringA
OutputDebugStringA
GetConsoleCP
FlushFileBuffers
GetSystemTimeAsFileTime
ExitProcess
SetConsoleCtrlHandler
GetLocaleInfoW
TlsSetValue
GetStartupInfoW
HeapFree
WriteFile
SetUnhandledExceptionFilter
GetModuleFileNameW
IsValidLocale
GetCurrentProcessId
GetFileType
GetFullPathNameW
ReadFileEx
GetStringTypeW
IsBadReadPtr
InterlockedIncrement
QueryPerformanceCounter
EnterCriticalSection
SetConsoleTextAttribute
GetCurrentThread
SetFilePointer
LCMapStringW
LeaveCriticalSection
LoadLibraryA
VirtualFree
InitializeCriticalSection
MultiByteToWideChar
GetStringTypeA
UnhandledExceptionFilter
LocalCompact
GetEnvironmentStrings
CreateFileA
ConnectNamedPipe
HeapValidate
SetStdHandle
GetUserDefaultLCID
GetCurrentThreadId
GetPrivateProfileSectionNamesW
GetVersionExA
GetCurrentProcess
CompareStringW
SystemTimeToTzSpecificLocalTime
EnumSystemLocalesA
ResumeThread
TlsFree
DebugBreak
HeapCreate
GetTimeZoneInformation
FreeEnvironmentStringsW
GetDateFormatA
lstrlenA
GetModuleHandleA
TlsGetValue
SetWaitableTimer
EnumResourceTypesW
GetEnvironmentStringsW
GetStartupInfoA
GetConsoleOutputCP
HeapDestroy
GetModuleFileNameA
HeapAlloc
GetACP
VirtualQuery
TerminateProcess
ReadFile
SetHandleCount
GetShortPathNameW
SetLastError
InterlockedDecrement
GetStdHandle
CopyFileA
GlobalUnlock
HeapReAlloc
GetProcessHeap
CreateMutexA
IsDebuggerPresent
WriteConsoleA
IsValidCodePage
GetCPInfo
WriteConsoleW
GetLastError
GetConsoleMode
GetOEMCP
InterlockedExchange
GetCommandLineW
GetTimeFormatA
FreeEnvironmentStringsA
GetLocaleInfoA
OutputDebugStringW
GlobalFlags
CloseHandle
FreeLibraryAndExitThread
user32
RegisterClassExA
InvertRect
FindWindowExA
CheckMenuRadioItem
GetUserObjectSecurity
DlgDirSelectExW
SendMessageA
EnumWindowStationsW
MapVirtualKeyA
CreateWindowExA
GetInputDesktop
MessageBoxIndirectA
LookupIconIdFromDirectory
GetClipboardFormatNameW
DrawIconEx
SetMenuItemInfoW
GetWindowWord
RegisterClassA
IsDialogMessageA
GetWindowContextHelpId
SetMenuItemInfoA
Sections
.text Size: 511KB - Virtual size: 510KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ