Static task
static1
Behavioral task
behavioral1
Sample
48c51b3089d5eea4a61a9aa18a9a5cc2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48c51b3089d5eea4a61a9aa18a9a5cc2.exe
Resource
win10v2004-20231215-en
General
-
Target
48c51b3089d5eea4a61a9aa18a9a5cc2
-
Size
52KB
-
MD5
48c51b3089d5eea4a61a9aa18a9a5cc2
-
SHA1
1c12db58521861fda8fbd69d931202423b7f38ce
-
SHA256
1a159e821ef5ca6c6ace5b5c863827dc4b30bca1283f92ddf5c73c580ad05aa4
-
SHA512
64ff049300a78dce2490ee859086b871d0803a2377f2e5a4e2f20caef96cfafcba1ad29dc1e23d2356fea46e9aa5423f4f3d6097425ba23048130bef0911edcb
-
SSDEEP
768:zZrRZq9XNrrdxfVXcPquK8fUPmmbt22dkHXpf+FVqEiMPrGqzFjxItD/3KFjBFsy:JRclrnftcPquKcUjtQ3pf+FV/YujHsy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48c51b3089d5eea4a61a9aa18a9a5cc2
Files
-
48c51b3089d5eea4a61a9aa18a9a5cc2.exe windows:4 windows x86 arch:x86
3259d8704f0d4129320470bf091fb96b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushInstructionCache
InterlockedDecrement
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
LoadLibraryA
VirtualProtect
SetLastError
GetStartupInfoA
DeviceIoControl
lstrcmpiA
GetLongPathNameW
lstrlenA
HeapAlloc
GetCurrentThreadId
OpenProcess
lstrlenW
LoadLibraryExW
MultiByteToWideChar
GetVersionExA
GetProcAddress
FreeLibrary
CloseHandle
RemoveDirectoryA
FindNextFileA
GetTickCount
MoveFileA
GetWindowsDirectoryA
GetShortPathNameA
SetFileAttributesA
DeleteFileA
GetProcessHeap
GetTempPathA
GetTempFileNameA
MoveFileExA
FindFirstFileA
FindClose
GetEnvironmentVariableA
HeapFree
TerminateProcess
WideCharToMultiByte
ReadProcessMemory
lstrcmpA
GetSystemDirectoryA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetLastError
LocalFree
SearchPathW
GetCurrentProcessId
GetModuleHandleA
user32
ShowWindow
LoadStringA
GetWindowLongA
GetParent
GetWindow
SystemParametersInfoA
DefWindowProcA
PostMessageA
FindWindowExA
MapWindowPoints
SetWindowPos
EndPaint
MessageBoxA
BeginPaint
GetDlgItem
GetWindowRect
ScreenToClient
DrawTextA
PostQuitMessage
GetSystemMetrics
LoadImageA
SendMessageA
SetDlgItemTextA
IsDialogMessageA
SetWindowLongA
DestroyWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
CreateDialogParamA
GetClientRect
gdi32
SelectObject
SetBkMode
SetTextColor
GetStockObject
shell32
CommandLineToArgvW
ShellExecuteA
ole32
CoInitialize
CoUninitialize
comctl32
InitCommonControlsEx
msvcrt
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_mbstok
_vsnprintf
memcmp
strrchr
_except_handler3
strlen
fopen
rewind
fgets
_strnicmp
fseek
fprintf
fclose
memcpy
free
??2@YAPAXI@Z
memmove
realloc
_purecall
_EH_prolog
__CxxFrameHandler
memset
_osver
shlwapi
StrCmpNIA
PathAppendA
PathIsDirectoryA
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
StrStrIA
PathCombineA
PathFileExistsA
SHGetValueA
StrStrIW
StrChrW
psapi
GetModuleInformation
advapi32
OpenSCManagerA
GetExplicitEntriesFromAclA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
ControlService
ChangeServiceConfigA
OpenServiceA
SetNamedSecurityInfoA
GetUserNameA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
DeleteAce
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ