Static task
static1
Behavioral task
behavioral1
Sample
48b15c0044513664cfd64224ea3aa764.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48b15c0044513664cfd64224ea3aa764.exe
Resource
win10v2004-20231215-en
General
-
Target
48b15c0044513664cfd64224ea3aa764
-
Size
11KB
-
MD5
48b15c0044513664cfd64224ea3aa764
-
SHA1
e510f70fb52b82970e5f7897bc2d659030eb3211
-
SHA256
56b6016b17fadd82921820990c02c56f7b354920b6dcf9a29bc536e21b4b356d
-
SHA512
e4a8c22781bfded5fe5c90927b4def4c800ba8ee56ec583519420ab608f76a312b1ef79e56b4781d186aa82228a266266c8bbe66e6092afa8519b90c2162b9d7
-
SSDEEP
192:lL7gvFQnEzJKb78hIbFIC/HCA5P0Q0yhshpK6RLdqf/ub1rxKL/1vrS:h0qUK38hIxuA+Qjsh86RJqf/upUv+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48b15c0044513664cfd64224ea3aa764
Files
-
48b15c0044513664cfd64224ea3aa764.exe windows:5 windows x86 arch:x86
2cfc4299f3992b4c4b8e3ee8bacfcfc3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsW
ClearCommBreak
ClearCommError
CloseHandle
CompareStringA
CompareStringW
ContinueDebugEvent
CreateDirectoryExA
CreateHardLinkA
DeleteAtom
DeleteTimerQueue
DeleteVolumeMountPointW
EnumResourceLanguagesA
EnumSystemCodePagesA
ExitThread
FillConsoleOutputCharacterW
FindFirstFileExW
FindNextVolumeMountPointA
FlushInstructionCache
GetACP
GetAtomNameA
GetBinaryType
GetBinaryTypeA
GetCPInfo
GetCommTimeouts
GetComputerNameW
GetConsoleAliasesW
GetConsoleCP
GetCurrencyFormatW
GetCurrentThread
GetDiskFreeSpaceExW
GetEnvironmentStringsA
GetExitCodeProcess
GetLogicalDriveStringsW
GetModuleFileNameW
GetNamedPipeHandleStateA
GetPrivateProfileIntW
GetProcessShutdownParameters
GetStartupInfoA
GetStdHandle
GetSystemDefaultLCID
GetSystemInfo
GetSystemPowerStatus
GetThreadTimes
AreFileApisANSI
GetVolumeInformationW
GetVolumePathNameW
GlobalCompact
Heap32Next
HeapCompact
HeapUnlock
IsBadStringPtrW
IsDBCSLeadByteEx
IsSystemResumeAutomatic
LockFileEx
MapUserPhysicalPages
MoveFileW
OpenEventA
ReadConsoleA
ReadConsoleOutputA
ResumeThread
RtlFillMemory
SearchPathA
SetCommMask
SetCommState
SetComputerNameA
SetConsoleCursorInfo
SetConsoleOutputCP
SetDefaultCommConfigW
SetFileTime
SetHandleInformation
SetMailslotInfo
SetProcessPriorityBoost
SetTapePosition
SystemTimeToFileTime
TerminateThread
TlsGetValue
UnlockFileEx
VerLanguageNameA
VirtualAlloc
VirtualFree
VirtualQueryEx
WriteConsoleOutputCharacterW
WriteConsoleOutputW
WritePrivateProfileStructW
WriteProfileStringW
lstrcmpA
lstrcmpiW
lstrcpy
GetProcAddress
GetTimeFormatW
GetModuleHandleA
msvcrt
memset
user32
CloseClipboard
CloseWindowStation
CopyAcceleratorTableA
CreateIconFromResourceEx
CreateIconIndirect
CreateMDIWindowW
CreateWindowExA
DdeDisconnect
DdeDisconnectList
DdeQueryStringW
DefMDIChildProcA
DeferWindowPos
DestroyCaret
DestroyMenu
DestroyWindow
DialogBoxParamA
DlgDirListA
DlgDirSelectComboBoxExW
DragDetect
DrawFrame
DrawIcon
DrawIconEx
DrawMenuBar
DrawStateW
EnumDesktopsW
EnumDisplayMonitors
EnumWindowStationsW
EqualRect
ExitWindowsEx
GetCaretPos
GetClassInfoExA
GetClassLongW
GetClientRect
GetClipboardFormatNameA
GetClipboardViewer
GetDesktopWindow
GetKeyboardLayoutNameA
GetLastInputInfo
GetMenuDefaultItem
GetMenuItemInfoA
GetMenuStringW
GetProcessWindowStation
GetShellWindow
GetUserObjectInformationW
GrayStringA
HideCaret
IMPGetIMEW
IMPQueryIMEW
IMPSetIMEA
IMPSetIMEW
InSendMessage
IsCharAlphaNumericW
LoadCursorFromFileW
LoadImageA
LoadImageW
LoadMenuIndirectW
LoadMenuW
MapVirtualKeyExW
MessageBoxA
ModifyMenuW
MonitorFromWindow
OffsetRect
OpenClipboard
OpenIcon
PeekMessageA
PostMessageW
RealGetWindowClassW
RegisterClassW
RegisterDeviceNotificationA
ScreenToClient
SendDlgItemMessageA
SendIMEMessageExA
SendMessageW
SetCapture
SetDlgItemTextA
SetForegroundWindow
SetScrollRange
SetThreadDesktop
SetTimer
SetUserObjectInformationA
SetWindowLongA
SetWindowsHookExA
SubtractRect
SystemParametersInfoW
UnhookWindowsHook
UnloadKeyboardLayout
UnpackDDElParam
ValidateRgn
WinHelpA
WinHelpW
wsprintfW
CheckMenuItem
advapi32
RegOpenKeyExW
RegOpenKeyA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ