Static task
static1
Behavioral task
behavioral1
Sample
49d6f2b5f2249d18068d2ddc80c60c01.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49d6f2b5f2249d18068d2ddc80c60c01.exe
Resource
win10v2004-20231222-en
General
-
Target
49d6f2b5f2249d18068d2ddc80c60c01
-
Size
379KB
-
MD5
49d6f2b5f2249d18068d2ddc80c60c01
-
SHA1
b112ce31cb0b42c5f0f78b1f8127eff1d05b0e7a
-
SHA256
05b7ae4e55ec9147d2bcca4542af052809a98a520471c87a5f78409e3e53eac9
-
SHA512
97f00e09af0ab8f826fbf9ff647a96477c65e972035e512126e63d7841a58c5db8d737c4196cb4d6d3b5db874b87dee51550b9501e1dd8e0fe221ae904461ecc
-
SSDEEP
6144:yBx4siB0g9c+59szU5praHmy2zQ29systLIr2UH5a9Gv2GQG7TAq+NKeOGP2NNxV:yBasilcsszU5pRnJsw2u5vTh0fOGCNxC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49d6f2b5f2249d18068d2ddc80c60c01
Files
-
49d6f2b5f2249d18068d2ddc80c60c01.exe windows:4 windows x86 arch:x86
119d0e2803df98c13afc3a145b2ad700
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GetStartupInfoA
GetModuleFileNameW
GetFileType
RtlUnwind
EnterCriticalSection
GetEnvironmentStringsW
GetCurrentProcess
WriteFile
VirtualAlloc
GetStartupInfoW
TlsAlloc
HeapReAlloc
TlsGetValue
DeleteCriticalSection
TlsFree
HeapDestroy
InterlockedExchange
GetModuleFileNameA
IsBadWritePtr
GetModuleHandleA
ExitProcess
SetHandleCount
GetLastError
GlobalLock
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
TlsSetValue
HeapCreate
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCPInfo
VirtualFree
GetCommandLineW
VirtualQuery
GetCurrentThreadId
GetVersion
HeapAlloc
UnhandledExceptionFilter
HeapFree
EnumResourceTypesW
TerminateProcess
GetCurrentProcessId
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
VirtualUnlock
GetCommandLineA
GetStdHandle
SetLastError
GetCurrentThread
InitializeCriticalSection
GetProcAddress
user32
GetInputState
LoadKeyboardLayoutA
ReleaseCapture
DrawStateA
GetProcessDefaultLayout
GetActiveWindow
SetCaretPos
DispatchMessageW
ChildWindowFromPointEx
CharLowerA
GetKeyboardLayoutNameW
SetWindowWord
BlockInput
TranslateMDISysAccel
SetWindowContextHelpId
DlgDirSelectExA
RegisterClassW
GetKeyboardState
SetWindowPos
RemovePropA
CreateIcon
CharToOemBuffA
advapi32
AbortSystemShutdownW
RegCreateKeyW
CryptEnumProviderTypesA
InitiateSystemShutdownA
RegCreateKeyA
RegQueryInfoKeyA
CryptDuplicateHash
RegLoadKeyW
LookupPrivilegeNameA
CryptHashData
GetUserNameA
RegEnumKeyExA
LookupAccountNameW
ReportEventW
CryptSetKeyParam
AbortSystemShutdownA
InitializeSecurityDescriptor
CryptGetDefaultProviderA
StartServiceA
RegConnectRegistryA
RegSetValueA
CryptEnumProvidersA
CryptEnumProvidersW
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ