Static task
static1
Behavioral task
behavioral1
Sample
4555a113cc4b41d1078fde075407aa8d.exe
Resource
win7-20231215-en
General
-
Target
4555a113cc4b41d1078fde075407aa8d.exe
-
Size
183KB
-
MD5
4555a113cc4b41d1078fde075407aa8d
-
SHA1
fed98e804c9d9b0f5119e363cc82450074f20d48
-
SHA256
1ed883bdd2c9c9002af759cfe77a115eec6e13f36a6581ef9b0f31c8f850f4b9
-
SHA512
b4c8dd7ea21184763c40b662bd1342148535b188c47da5beaf91e36fa441ef6698b6a6694f1d5dae6f70022927df1272ea57001e82b9a3518ce4f50ef75035ff
-
SSDEEP
3072:E5OinqcyoR8SPQNttedqqUtagtJzoZeGlJC0Sk:QW9oRtQNttedqqpgtJzoIe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4555a113cc4b41d1078fde075407aa8d.exe
Files
-
4555a113cc4b41d1078fde075407aa8d.exe.exe windows:5 windows x86 arch:x86
3fa6f9876f4c3cdec72987baad3af85b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
InitializeCriticalSectionAndSpinCount
IsValidLocale
GetCurrentProcessId
GetFileTime
VirtualProtect
GetModuleFileNameA
GlobalFree
GetEnvironmentVariableA
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetSystemDirectoryA
CreateSemaphoreA
Sleep
GlobalAlloc
GetWindowsDirectoryA
IsBadReadPtr
MoveFileExA
GetLocaleInfoA
HeapSize
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStringTypeA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteFile
ExitProcess
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetProcAddress
GetModuleHandleW
GetFileType
GetStdHandle
SetHandleCount
GetModuleHandleA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
user32
SetDlgItemInt
GetParent
IsIconic
SetWindowLongA
GetDlgItemInt
SetCursor
GetDlgItem
ScrollWindow
ShowScrollBar
SetWindowTextA
InsertMenuItemA
GetWindow
FindWindowA
comctl32
ImageList_EndDrag
ImageList_Create
ImageList_GetImageCount
ImageList_DragEnter
comdlg32
ReplaceTextA
GetSaveFileNameA
GetOpenFileNameA
shlwapi
PathFindFileNameA
PathIsUNCA
AssocQueryStringA
PathGetDriveNumberA
wnsprintfA
crypt32
CertCreateCertificateContext
CertOpenStore
CertFreeCertificateChain
CertFreeCertificateContext
CertAddCertificateContextToStore
CertGetCertificateChain
CertVerifyCertificateChainPolicy
CryptHashCertificate
pdh
PdhGetRawCounterValue
PdhMakeCounterPathA
PdhSetLogSetRunID
PdhParseInstanceNameA
PdhGetFormattedCounterValue
PdhParseCounterPathA
PdhSetQueryTimeRange
PdhRemoveCounter
PdhGetDefaultPerfCounterHA
PdhGetLogSetGUID
PdhFormatFromRawValue
PdhSetDefaultRealTimeDataSource
PdhLookupPerfIndexByNameA
PdhGetDataSourceTimeRangeH
PdhGetDefaultPerfCounterA
PdhOpenLogA
PdhGetDataSourceTimeRangeA
PdhOpenQueryA
PdhGetCounterTimeBase
PdhReadRawLogRecord
PdhGetRawCounterArrayA
PdhGetDefaultPerfObjectA
PdhGetFormattedCounterArrayA
PdhLookupPerfNameByIndexA
PdhSetCounterScaleFactor
PdhGetDefaultPerfObjectHA
PdhGetDllVersion
PdhGetCounterInfoA
PdhGetLogFileSize
PdhSelectDataSourceA
PdhOpenQueryH
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 980KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ