Static task
static1
Behavioral task
behavioral1
Sample
458ad2463c8a61f37ce0c256d5d824e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
458ad2463c8a61f37ce0c256d5d824e0.exe
Resource
win10v2004-20231215-en
General
-
Target
458ad2463c8a61f37ce0c256d5d824e0
-
Size
447KB
-
MD5
458ad2463c8a61f37ce0c256d5d824e0
-
SHA1
3d9e3331f558962d5fbbab68f8a9dcca0b31bb6f
-
SHA256
b1b4adb57471b463700ab48f81cd2550270fac73e0c1a95366fdc4380d15a659
-
SHA512
690cc999cf47d7d4020c3087c261b67a1468ed38392cf7b63ff41ed18a93d1a36a2f685c6f44c4121e61a2f49430ac019b7aff45a3a4a8a8da89339ce40b3a17
-
SSDEEP
12288:efiUDGoIgDSiJc8uFxhSGeFSkVKNA9iMVLF1qHYfpRY80HiN433FLNNNNNNNNNNb:5QjJcJiGegkVIGLF1q4fpRY80HiN433h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 458ad2463c8a61f37ce0c256d5d824e0
Files
-
458ad2463c8a61f37ce0c256d5d824e0.exe windows:6 windows x86 arch:x86
d4cc1601fd324eebfdf856765dda2bd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundW
kernel32
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
CreateFileW
GetFileSizeEx
GetConsoleOutputCP
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
MultiByteToWideChar
CloseHandle
FlushFileBuffers
HeapSize
HeapReAlloc
SetEndOfFile
lstrcmpW
LocalFree
GetCommandLineW
VirtualProtect
WriteConsoleW
FindClose
GetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
DecodePointer
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
ReadFile
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
shell32
CommandLineToArgvW
SHGetFolderPathW
user32
TranslateMessage
LoadCursorW
GetSysColorBrush
LoadImageA
SendMessageW
SetWindowTextW
ShowWindow
IsWindow
SetFocus
wsprintfW
SetWindowLongW
PostQuitMessage
LoadImageW
DispatchMessageW
GrayStringA
GetMessageW
GetWindowRect
SetWindowPos
FillRect
GetSystemMetrics
RedrawWindow
MapWindowPoints
GetClientRect
DrawTextW
InvalidateRect
GetWindowTextW
DefWindowProcW
CreateWindowExW
RegisterClassW
GetDC
GetWindowTextLengthW
gdi32
CreateCompatibleDC
CreateFontW
GetStockObject
SetBkColor
BitBlt
SelectObject
SetTextColor
SetBkMode
GetObjectW
CreateSolidBrush
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ