Static task
static1
Behavioral task
behavioral1
Sample
48b2248688a341e91afd3c7feae72f30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48b2248688a341e91afd3c7feae72f30.exe
Resource
win10v2004-20231215-en
General
-
Target
48b2248688a341e91afd3c7feae72f30
-
Size
291KB
-
MD5
48b2248688a341e91afd3c7feae72f30
-
SHA1
8f6dc360c570cd632bd02464026867aa2d5269db
-
SHA256
a21528b1b40a57f90bd5b5a8f50ef6f9db1c62f022646dcde922aa4b870541d0
-
SHA512
75999002af88a62779877fa71f6147b84f398795122d9b34a90a7afef5637cda1184ea83f9df41c6441679326bf4cd46eaf1c7dd2ef2dbdafad306fc9c5bdf7e
-
SSDEEP
6144:d7nV1kGNTdIXVlaTjUqniycVtx7+hdxhuW+ddAAV+:drgGmcjiBx8dzF7C+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48b2248688a341e91afd3c7feae72f30
Files
-
48b2248688a341e91afd3c7feae72f30.exe windows:5 windows x86 arch:x86
4138a56866fe20e81b5b2ec63da06382
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
WriteProcessMemory
lstrlenW
GetModuleFileNameW
Sleep
ReadProcessMemory
lstrcmpA
GetModuleHandleA
IsDebuggerPresent
GetCurrentProcess
VerLanguageNameA
CloseHandle
lstrlenA
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
InitializeCriticalSectionAndSpinCount
GetProcAddress
GetModuleFileNameA
lstrcpyA
CreateMutexA
GetLastError
lstrcatA
lstrcmpiA
ExitProcess
GetStartupInfoA
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
GetModuleHandleW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
RtlUnwind
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringA
MultiByteToWideChar
CompareStringW
SetEnvironmentVariableA
user32
CreateWindowExA
SetWindowLongA
DestroyIcon
InsertMenuA
CreateMenu
EnableMenuItem
DispatchMessageA
DefWindowProcA
SetTimer
GetParent
MessageBoxA
UpdateWindow
gdi32
StretchBlt
DeleteDC
TextOutA
RealizePalette
BitBlt
DeleteObject
comdlg32
PrintDlgA
shell32
Shell_NotifyIconA
ShellExecuteA
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ