Static task
static1
Behavioral task
behavioral1
Sample
46413eda226a61369b35499fbd87165c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46413eda226a61369b35499fbd87165c.exe
Resource
win10v2004-20231222-en
General
-
Target
46413eda226a61369b35499fbd87165c
-
Size
364KB
-
MD5
46413eda226a61369b35499fbd87165c
-
SHA1
c62d1dba3d7ca20faf9591ec3c4fdc1787343986
-
SHA256
b2961da1f112ca7b78e59b18aad246f8d66b56b745f06b0cf1d2c7d895269c70
-
SHA512
64bb35705e0eedbfcaf681509757dd89118b93ff875adf4b049b32d42d476cae49d66ed33f8d821e6c609bcf496e8d311cce14425b3a4f1eeced3507847992ba
-
SSDEEP
6144:bb4d0p1243vXr02mZbhKfLoN+QjwyB+pHIEOqF5CPqU9Ty:b+0CEXNm+DowQUG+poEnKPx9G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46413eda226a61369b35499fbd87165c
Files
-
46413eda226a61369b35499fbd87165c.exe windows:4 windows x86 arch:x86
bfd6e96ab34189b4f7b3049c959f2e47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Ellipse
EnumFontsW
GetViewportOrgEx
ExtFloodFill
GetObjectW
StartDocA
GetKerningPairsA
GetSystemPaletteUse
DeleteDC
Rectangle
OffsetWindowOrgEx
SetPixelFormat
SelectObject
GetCharWidthA
GetCharacterPlacementA
GetDeviceCaps
GetCharWidthW
GetObjectA
SelectPalette
EnumMetaFile
ExtCreatePen
CreateDCA
CreateDIBPatternBrush
GetLogColorSpaceA
CreatePatternBrush
GetRasterizerCaps
GetCharWidth32A
OffsetClipRgn
PlayEnhMetaFile
RectInRegion
kernel32
SetWaitableTimer
GetUserDefaultLCID
GetLocaleInfoW
TlsSetValue
CreateMutexA
LCMapStringA
GetCurrentProcess
GetStartupInfoW
HeapAlloc
HeapReAlloc
FreeLibrary
GetStringTypeA
WriteConsoleW
FreeEnvironmentStringsW
WaitNamedPipeW
GetModuleFileNameA
HeapCreate
SetEnvironmentVariableA
SetFilePointer
GetFileType
LCMapStringW
DeleteCriticalSection
VirtualQuery
GetModuleFileNameW
InterlockedDecrement
InitializeCriticalSection
GetCurrentThread
GetVersionExA
GetCommandLineA
TlsAlloc
GetCommandLineW
GetStringTypeW
CloseHandle
GetDateFormatA
Sleep
HeapSize
SetStdHandle
GetStartupInfoA
InterlockedExchange
CompareStringW
FlushFileBuffers
ReadFile
IsValidLocale
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
GetCurrentProcessId
WriteConsoleA
GetTimeFormatA
GetConsoleCP
ReadConsoleW
SetConsoleCtrlHandler
TlsGetValue
HeapFree
TlsFree
GetProfileSectionW
CompareStringA
TerminateProcess
GetProcAddress
GetLogicalDrives
GetModuleHandleA
GetEnvironmentStrings
RtlUnwind
InterlockedIncrement
WriteFile
CreateFileA
GetFileAttributesA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetTimeZoneInformation
GetConsoleMode
GetEnvironmentStringsW
LoadLibraryA
IsValidCodePage
HeapDestroy
MultiByteToWideChar
SetHandleCount
GetLastError
GetOEMCP
EnumSystemLocalesA
ExitProcess
GetCPInfo
VirtualAlloc
GetACP
SetLastError
GetStdHandle
GetConsoleOutputCP
IsDebuggerPresent
OpenMutexA
UnhandledExceptionFilter
GetProcessHeap
GetLocaleInfoA
LeaveCriticalSection
GetTickCount
WideCharToMultiByte
EnterCriticalSection
VirtualFree
comctl32
CreateUpDownControl
ImageList_AddMasked
ImageList_SetFilter
ImageList_LoadImageW
ImageList_SetFlags
InitCommonControlsEx
CreateToolbar
ImageList_SetOverlayImage
ImageList_SetDragCursorImage
GetEffectiveClientRect
user32
TileChildWindows
DdeCmpStringHandles
CheckMenuItem
ShowWindow
InsertMenuItemW
EndMenu
BroadcastSystemMessageW
RemovePropA
CopyImage
DdeAddData
SetSysColors
CharNextW
CloseWindow
SendMessageTimeoutW
CreateDesktopW
DdeClientTransaction
GetDlgItemTextW
ImpersonateDdeClientWindow
SetDlgItemTextA
CopyIcon
RegisterWindowMessageA
InvalidateRgn
RegisterClassA
RegisterClassExA
MessageBoxExA
UnhookWindowsHook
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ