Static task
static1
Behavioral task
behavioral1
Sample
46fe4056aa3c3e27aac2b5ed8da67733.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46fe4056aa3c3e27aac2b5ed8da67733.exe
Resource
win10v2004-20231222-en
General
-
Target
46fe4056aa3c3e27aac2b5ed8da67733
-
Size
111KB
-
MD5
46fe4056aa3c3e27aac2b5ed8da67733
-
SHA1
49d2543b7e754e55d0c5f98cfc585a285375f842
-
SHA256
b1e9526fb6b4bed2edf9b486bd041dc6d8e6950f026c1a83ec0533eecff9cff4
-
SHA512
0ba03c40e1e34d68cb4d80a2c9447177d485a81a422b629f3b213eae4fc0e3d49728e0060172f8dbb2e5f6a29e5016ea49363176518f64c8550a2fb1caf40ede
-
SSDEEP
1536:OVejHMLv3OeRp/UvZupD6dqBQ5Xf50c1gST6ypX2BGZqW+kp402:OVejHMT31RCaDOLhiWX2BSqW+j0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46fe4056aa3c3e27aac2b5ed8da67733
Files
-
46fe4056aa3c3e27aac2b5ed8da67733.exe windows:4 windows x86 arch:x86
bdd268077206dfc747de7f67a81bb943
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDIBits
GetClipBox
SaveDC
CopyEnhMetaFileA
user32
SetClassLongA
DrawAnimatedRects
GetClassLongA
GetLastActivePopup
UnregisterClassA
CharNextW
UpdateWindow
MsgWaitForMultipleObjects
GetKeyboardLayout
GetDesktopWindow
GetMessagePos
FindWindowA
GetDC
SetWindowsHookExA
SetRect
GetFocus
ShowWindow
IntersectRect
RemovePropA
IsDialogMessageW
GetWindowDC
DispatchMessageW
MoveWindow
GetKeyboardLayoutNameA
RegisterWindowMessageA
IsWindowVisible
SetWindowTextA
ShowScrollBar
LoadKeyboardLayoutA
DestroyIcon
CloseClipboard
ClientToScreen
OpenClipboard
EnumChildWindows
IsDialogMessageA
SetActiveWindow
GetMenuItemID
ChildWindowFromPoint
GetWindowRect
SetTimer
DefMDIChildProcA
DrawMenuBar
SetParent
IsWindowEnabled
GetWindowThreadProcessId
InvalidateRect
IsZoomed
MapVirtualKeyA
SetWindowPos
GetKeyboardType
GetKeyState
wsprintfA
SetScrollInfo
GetCursor
GetClipboardData
GetMenuStringA
MessageBeep
RegisterClassA
GetCursorPos
GetIconInfo
MapWindowPoints
GetClassInfoA
DestroyMenu
PeekMessageA
SetMenu
CharLowerBuffA
DestroyWindow
SetWindowLongW
ActivateKeyboardLayout
CallNextHookEx
SetScrollPos
GetSystemMetrics
EqualRect
EmptyClipboard
RedrawWindow
DrawTextA
GetClassNameA
GetActiveWindow
UnhookWindowsHookEx
OffsetRect
ReleaseCapture
EnableWindow
RegisterClipboardFormatA
GetForegroundWindow
KillTimer
GetWindow
AdjustWindowRectEx
GetWindowLongA
SetMenuItemInfoA
LoadStringA
ReleaseDC
LoadCursorA
GetMenu
GetWindowLongW
GetKeyboardState
CreatePopupMenu
shell32
DragQueryFileA
Shell_NotifyIconA
SHGetDesktopFolder
oleaut32
VariantChangeType
SysAllocStringLen
SysStringLen
kernel32
lstrlenA
ExitThread
GetLastError
lstrcatA
SetEvent
GetModuleHandleA
VirtualAlloc
SetLastError
GetVersionExA
VirtualAllocEx
Sleep
GlobalFindAtomA
CreateEventA
ExitProcess
LocalAlloc
GetProcAddress
GetSystemDefaultLangID
version
VerInstallFileA
VerFindFileA
VerQueryValueA
shlwapi
SHEnumValueA
PathFileExistsA
SHSetValueA
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
PathIsContentTypeA
comctl32
ImageList_Create
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ