Static task
static1
Behavioral task
behavioral1
Sample
48a1795074d3297785fdcc1472269f2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48a1795074d3297785fdcc1472269f2a.exe
Resource
win10v2004-20231222-en
General
-
Target
48a1795074d3297785fdcc1472269f2a
-
Size
2.2MB
-
MD5
48a1795074d3297785fdcc1472269f2a
-
SHA1
02ab7866ac652e5d55855c0452bdcc8453930708
-
SHA256
acd087934cb8df2c648b847000ce14c69d0be42b0356ae387686dc08f2cdf06b
-
SHA512
5430b8c492b727b54564d80447e8a0da4cd055203dd0a4beac2a4d04df56554b5744e227a4ee367080edea8d62b9f6cf1a8a3e88951c9baac73187789912984e
-
SSDEEP
49152:egjOvljeIgjdsk9WnOjwnNTBXHF+3j5D78OBU:QgjOk9WOc/Cs1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48a1795074d3297785fdcc1472269f2a
Files
-
48a1795074d3297785fdcc1472269f2a.exe windows:5 windows x64 arch:x64
1bd67dd8504dbae818abb397bad318ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcr100
fgets
fopen
?terminate@@YAXXZ
__C_specific_handler
_amsg_exit
__getmainargs
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
strtok
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
_unlock
__dllonexit
_lock
_onexit
fseek
fclose
strstr
getenv
memcpy
_vsnprintf_s
_ftime64_s
strftime
_snprintf_s
_localtime64
_wstat64i32
strcat_s
memcpy_s
_splitpath_s
strcpy_s
atoi
sprintf_s
??_V@YAXPEAX@Z
sscanf
__argv
__argc
_putenv
sprintf
__CxxFrameHandler3
memmove
??0exception@std@@QEAA@AEBV01@@Z
_CxxThrowException
??2@YAPEAX_K@Z
free
printf
_stat64i32
_snprintf
??_U@YAPEAX_K@Z
_time64
??3@YAXPEAX@Z
??1exception@std@@UEAA@XZ
?what@exception@std@@UEBAPEBDXZ
??0exception@std@@QEAA@AEBQEBD@Z
_mbslwr
_mbsstr
_mbsrchr
_mbsnbcpy
_mbsnbcpy_s
_mbschr
strrchr
memset
calloc
_strdup
_mbsnbcmp
_mbsicmp
_initterm
_mbscmp
malloc
kernel32
MultiByteToWideChar
FreeLibrary
RaiseException
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
EncodePointer
GetStartupInfoW
Sleep
lstrcpynA
WideCharToMultiByte
lstrcmpiA
GetSystemWindowsDirectoryA
GetFileAttributesA
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
GetShortPathNameA
GetLongPathNameA
FormatMessageA
LocalAlloc
lstrlenA
CreateProcessA
GetSystemDirectoryA
LoadLibraryA
CreateFileA
CloseHandle
GetNativeSystemInfo
GetCurrentProcess
GetVersionExA
GlobalMemoryStatusEx
GetModuleHandleA
GetProcAddress
WaitForSingleObject
lstrcpyA
GetWindowsDirectoryA
FindFirstFileA
GetModuleFileNameA
FindClose
GetEnvironmentVariableA
GetLastError
LocalFree
user32
wsprintfA
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
SysAllocString
SysStringLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ