Static task
static1
Behavioral task
behavioral1
Sample
49494d493f95f99ffe477a3d721730d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49494d493f95f99ffe477a3d721730d7.exe
Resource
win10v2004-20231215-en
General
-
Target
49494d493f95f99ffe477a3d721730d7
-
Size
267KB
-
MD5
49494d493f95f99ffe477a3d721730d7
-
SHA1
227c6302b34be7bd402ed626223b589f40cff5d3
-
SHA256
d4875790fda55ca16740c830869819ba1543b5ad0e936174fa5e1bdb77039bbf
-
SHA512
83a687ac98bf1e6f9f08c4f47177ddfcca24eeee034a62f3d19267c70c37fcd20efa1935cbd67e7a2e824e2cb75281dc265191619c6049178e1d11c3f8ebf3e3
-
SSDEEP
6144:C6ybNJiR/2C7B3BsfLtMzqy8mk2eXo/k:CjJS05Fkk2eXo/k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49494d493f95f99ffe477a3d721730d7
Files
-
49494d493f95f99ffe477a3d721730d7.exe windows:5 windows x86 arch:x86
ea4f32113cfcfaaeb5c08ef60ad47107
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
SetFilePointer
SetLastError
GetLastError
FindResourceExA
LockResource
LoadResource
FindResourceA
ExitProcess
WriteProcessMemory
VirtualProtectEx
GetCurrentProcess
WaitForSingleObject
CreateThread
VirtualAlloc
GetProcAddress
LoadLibraryA
IsBadReadPtr
VirtualProtect
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RaiseException
HeapFree
IsProcessorFeaturePresent
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ReadFile
GetModuleHandleW
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetProcessHeap
LCMapStringW
GetStringTypeW
CreateFileW
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ