Static task
static1
Behavioral task
behavioral1
Sample
4656eb747e57f53cac26edd54949ca62.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4656eb747e57f53cac26edd54949ca62.exe
Resource
win10v2004-20231222-en
General
-
Target
4656eb747e57f53cac26edd54949ca62
-
Size
120KB
-
MD5
4656eb747e57f53cac26edd54949ca62
-
SHA1
26d936b5b06993832837754850c1a81f9d704983
-
SHA256
923426b0435c7a758fd83917026600df3190be0bfd4017d0fc73c698707a3015
-
SHA512
dcda95c96637f141517067ceb3e9dac4940b8f8d4a41e23899bce25576b7f196547c212681fab4d51633aae283490729f35a17d3b33eaefc8690fe80bd862d1d
-
SSDEEP
3072:Gi3vb4U8627m7oS4SlhUItIlRGJKgsC1uLQyUPw:GOT4G27KoSJEgsCUcy2w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4656eb747e57f53cac26edd54949ca62
Files
-
4656eb747e57f53cac26edd54949ca62.exe windows:4 windows x86 arch:x86
deb5ce3fcc2a665b78354c6195b02bc6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
ShowWindow
ShowCursor
SetWindowPos
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterWindowMessageA
RegisterClassA
PostThreadMessageA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
UpdateWindow
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
GetClipboardData
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
CloseClipboard
ClientToScreen
CharToOemA
CharLowerBuffA
wsprintfA
LoadIconA
AdjustWindowRect
kernel32
LCMapStringW
lstrlenA
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
TryEnterCriticalSection
AreFileApisANSI
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcessHeap
GetStartupInfoA
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LCMapStringA
TlsSetValue
LeaveCriticalSection
LoadLibraryA
MoveFileA
MulDiv
MultiByteToWideChar
OpenEventA
OpenFile
OutputDebugStringA
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
RemoveDirectoryW
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetStdHandle
SetThreadAffinityMask
SetThreadIdealProcessor
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
dinput
DirectInputCreateW
ws2_32
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSACleanup
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
htonl
htons
inet_addr
ioctlsocket
listen
recv
select
send
socket
shell32
SHFileOperationW
ShellExecuteA
SHGetSpecialFolderPathW
advapi32
InitializeSecurityDescriptor
AddAccessAllowedAce
AddAce
AllocateAndInitializeSid
EqualSid
GetAce
GetAclInformation
GetLengthSid
GetSecurityDescriptorDacl
GetTokenInformation
InitializeAcl
OpenProcessToken
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExA
SetSecurityDescriptorDacl
SetFileSecurityW
RegQueryValueExA
winmm
waveOutPrepareHeader
waveOutOpen
waveOutGetPosition
waveOutGetNumDevs
waveOutGetDevCapsW
waveOutGetDevCapsA
waveOutClose
waveOutReset
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInGetDevCapsW
waveInGetDevCapsA
waveOutUnprepareHeader
waveOutWrite
waveInUnprepareHeader
waveInAddBuffer
mciSendCommandA
timeBeginPeriod
timeEndPeriod
timeKillEvent
timeSetEvent
ole32
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
IsEqualGUID
PropVariantClear
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ