Static task
static1
Behavioral task
behavioral1
Sample
4988e3e3866338e62c84f79dd9459ab5.exe
Resource
win7-20231215-en
General
-
Target
4988e3e3866338e62c84f79dd9459ab5
-
Size
220KB
-
MD5
4988e3e3866338e62c84f79dd9459ab5
-
SHA1
42a9168b387aff28cf38151406797129d5c00069
-
SHA256
ee714169ef6d0e948444468f74456bda25935205cdad2cee39061579178e9d12
-
SHA512
5dcfb8d2d01e8dc1c7517e827e01da392e78631d710dd9c739d18af3c0c018d910b2cb5c76416bde4ae55a4af9e390bd8d03c1d24893e326c4a167421d3f48aa
-
SSDEEP
6144:t/EBPya0AUqoC1Y4WEeMHVMVNzPzd9sxjpwzMpeJ7BzY:t/Wyh4RJV8NV9gpww8J7RY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4988e3e3866338e62c84f79dd9459ab5
Files
-
4988e3e3866338e62c84f79dd9459ab5.exe windows:4 windows x86 arch:x86
e43f6d5defee2dec3ad88fae92b4bbed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetCurrentProcessId
CreateTimerQueue
Sleep
LocalReAlloc
LoadLibraryA
GetProcAddress
VirtualLock
GetModuleHandleA
VirtualProtect
WaitForMultipleObjects
InterlockedExchange
ResetEvent
FindNextFileA
GetExitCodeThread
GetCommandLineA
IsBadCodePtr
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
VirtualQuery
RtlUnwind
HeapReAlloc
HeapAlloc
VirtualAlloc
VirtualFree
DeleteFileA
GetLastError
GetCPInfo
GetOEMCP
GetStartupInfoA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
GetACP
GetSystemInfo
user32
ShowWindow
IsChild
PostMessageA
LoadCursorA
GetDesktopWindow
GetDC
IsIconic
SetTimer
ReleaseDC
CreateIcon
SetCursorPos
GetWindowRect
SetCursor
DestroyWindow
GetCursorPos
gdi32
SelectObject
CreateDIBPatternBrushPt
GetPixel
FloodFill
shell32
DuplicateIcon
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ