Static task
static1
Behavioral task
behavioral1
Sample
48b6022dc4f6418eb0342fd9d5b54078.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48b6022dc4f6418eb0342fd9d5b54078.exe
Resource
win10v2004-20231222-en
General
-
Target
48b6022dc4f6418eb0342fd9d5b54078
-
Size
43KB
-
MD5
48b6022dc4f6418eb0342fd9d5b54078
-
SHA1
2b28b522e54b96e7827c02a2273ca656db124743
-
SHA256
654bfc969698bab087247f04739af98d744c5d95889bf1a3f6a91f09eec58106
-
SHA512
6cc208d73ec3f742ee50de0dc95bdddca60e7cf5452b83547e271598d7392a0a848be0249b58e24811064535f45258e05d4e2650d9a4d3e5aac23fce93e18bfb
-
SSDEEP
768:LIG3+hCKJN1xLSWaQQc0AnJtuMP7r/luxcxY7zna71P6eKkR:Mk+1NPSdQQcbTDP/UdncseKA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48b6022dc4f6418eb0342fd9d5b54078
Files
-
48b6022dc4f6418eb0342fd9d5b54078.exe windows:5 windows x86 arch:x86
061abcaaef1248dc57d03b0f66de59ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetSystemTimeAsFileTime
ReleaseMutex
FindClose
lstrcatW
MoveFileExW
WriteFile
lstrlenA
HeapAlloc
GetCurrentThread
ExpandEnvironmentStringsW
CreateFileMappingW
CreateThread
GetModuleFileNameA
CopyFileW
GlobalLock
lstrcmpiA
OpenProcess
SetEndOfFile
UnmapViewOfFile
HeapFree
CreateEventW
SetEvent
SetFileAttributesW
CreateProcessW
GetTempPathW
SetLastError
MultiByteToWideChar
SetThreadPriority
FindFirstFileW
user32
OpenDesktopA
GetClipboardData
Sections
.azcz Size: 35KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rqx Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zkjcn Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ