Static task
static1
Behavioral task
behavioral1
Sample
46cff72648982fbfe935f72fde07e803.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46cff72648982fbfe935f72fde07e803.exe
Resource
win10v2004-20231215-en
General
-
Target
46cff72648982fbfe935f72fde07e803
-
Size
44KB
-
MD5
46cff72648982fbfe935f72fde07e803
-
SHA1
fee58dfc27f53db9051088ec9f71c11c51b91656
-
SHA256
b6d27f77c8c38d1632a47192bec4ede3cbb92353f8735d107a422b75f452798b
-
SHA512
cb721b67a29e150d7ff439a416057314356ae7f56b321ce44b27a32bb2116d7a061c22a9cac2d1de3b841a4dbfd1b203176496cffdd5c4ae44fd71181fab3aef
-
SSDEEP
768:FUisbobhPcVYtPoIV3NDz1IAB3T8vdcDZWsPBqPZ9:fsboN3oIV3lBj8v4ZWMKL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46cff72648982fbfe935f72fde07e803
Files
-
46cff72648982fbfe935f72fde07e803.exe windows:5 windows x86 arch:x86
ca839b0a0fb5ad0bc1f24e0c131d5c37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FoldStringW
GetCurrentProcessId
GetCommandLineW
MulDiv
GetFullPathNameW
LocalSize
GetLastError
WriteFile
SetLastError
WideCharToMultiByte
lstrcmpW
DeleteFileW
GetACP
GetDateFormatW
GetTimeFormatW
GlobalLock
GlobalUnlock
GlobalAlloc
LoadLibraryA
VirtualProtect
GetProcAddress
FindFirstFileW
FindClose
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualAlloc
HeapAlloc
GetModuleHandleA
SetEndOfFile
lstrcpyA
user32
SetCursor
SetWindowPos
GetWindowTextW
CreateDialogParamW
DialogBoxParamW
EnableWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetMenuState
EnableMenuItem
SetForegroundWindow
advapi32
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
IsTextUnicode
RegOpenKeyExW
RegCreateKeyW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyA
OpenSCManagerW
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ