Static task
static1
Behavioral task
behavioral1
Sample
48312d25aba0a08082a388c4998bf80e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48312d25aba0a08082a388c4998bf80e.exe
Resource
win10v2004-20231215-en
General
-
Target
48312d25aba0a08082a388c4998bf80e
-
Size
43KB
-
MD5
48312d25aba0a08082a388c4998bf80e
-
SHA1
e0e2190a92062c854dd17dceec75df2fafe2eda3
-
SHA256
e9a3ac7ba992ea3d51e584af52d6c664bda57cd27849741884754775c53f4186
-
SHA512
698a88c986b5987ad2922f26749c86b073c635d37849f60f384bf31c945ec54f59bca749d9e84ad450eb365546f29ce04a1248d5714bba6bf3b36748b0ccb144
-
SSDEEP
768:XL8k5gIdVX6ilrEkY3qQ/y9p76+eazucMZ3VjKsWsilfcZmJ81MgKUshZWwf6:XLXgAVKi339DxdSjKsWBcZmJ8hHq6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48312d25aba0a08082a388c4998bf80e
Files
-
48312d25aba0a08082a388c4998bf80e.exe windows:4 windows x86 arch:x86
1b999d0482dbbe39166b9db9a8bd08e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
GetCommandLineA
GetUserDefaultLangID
GetTickCount
CreateProcessA
CreateFileA
GetDiskFreeSpaceA
CreateThread
GetFileSize
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetWindowsDirectoryA
CreateDirectoryA
GetSystemDirectoryA
MultiByteToWideChar
GetVersionExA
CopyFileA
CreateEventA
SetEvent
RemoveDirectoryA
Sleep
SetFileAttributesA
lstrcpyA
lstrlenA
lstrcatA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
GetTempPathA
GetTempFileNameA
GetFileAttributesA
CompareFileTime
SetFileTime
CloseHandle
FindFirstFileA
DeleteFileA
GlobalAlloc
FindNextFileA
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
GetCurrentThread
GetLastError
GetCurrentProcess
LocalAlloc
LocalFree
GlobalFree
SetEndOfFile
user32
GetParent
EnumChildWindows
SetClassLongA
GetDlgItem
GetWindowRect
ScreenToClient
SetWindowPos
EnableWindow
SetFocus
EndDialog
IsWindowEnabled
DialogBoxParamA
SetTimer
SetWindowTextA
SetDlgItemTextA
CharNextA
CreateDialogParamA
DestroyWindow
PostQuitMessage
ShowWindow
CharPrevA
wsprintfA
FindWindowExA
IsWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
SetRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
LoadIconA
LoadCursorA
RegisterClassA
SystemParametersInfoA
GetDesktopWindow
GetDlgItemTextA
SendDlgItemMessageA
IsWindowVisible
SetForegroundWindow
LoadBitmapA
CreateWindowExA
MessageBoxA
gdi32
CreateBrushIndirect
GetNearestColor
SetBkColor
GetStockObject
CreatePen
MoveToEx
LineTo
GetTextColor
CreateCompatibleDC
BitBlt
GetObjectA
CreateFontIndirectA
CreateSolidBrush
DeleteObject
CreateFontA
SetBkMode
SetTextColor
SelectObject
advapi32
IsValidSecurityDescriptor
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
RegEnumValueA
RegCloseKey
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RevertToSelf
FreeSid
AccessCheck
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
shell32
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHFileOperationA
SHBrowseForFolderA
ole32
CoCreateInstance
OleUninitialize
OleInitialize
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
ord17
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE