Static task
static1
Behavioral task
behavioral1
Sample
492525bb44e8c6f8d5fac34bbd1c1e7d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
492525bb44e8c6f8d5fac34bbd1c1e7d.exe
Resource
win10v2004-20231215-en
General
-
Target
492525bb44e8c6f8d5fac34bbd1c1e7d.exe
-
Size
45KB
-
MD5
492525bb44e8c6f8d5fac34bbd1c1e7d
-
SHA1
18099d23a859720263e6ba4e7157f421511c2731
-
SHA256
411f8e87930ce85a80a120e65e8fa643369e138b940caa4df6b2908d1a065d78
-
SHA512
9478993d4fa09d15aa984d52bbf1ae06d2e69eb392e09e2ea99d237339ce2a54856864bfb16f93119ec353761010aa67224d71855e7997e1f700236b56a90a60
-
SSDEEP
768:0Fh93ptKME+akzPn1Y4pyawturcOxeFC5AugCt6tvZErHiqbMnEY7V:0FAHqPn1AawtpugCtMBEr3b7Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 492525bb44e8c6f8d5fac34bbd1c1e7d.exe
Files
-
492525bb44e8c6f8d5fac34bbd1c1e7d.exe.exe windows:5 windows x86 arch:x86
54116fc8b3f65d0c5d14bd19bc398f97
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageW
PeekMessageA
SetProcessWindowStation
LoadCursorW
SetThreadDesktop
ToUnicode
GetKeyState
GetDlgItemTextW
GetDlgItemTextA
EndDialog
GetWindowThreadProcessId
PeekMessageW
CharLowerBuffA
DispatchMessageW
FindWindowExW
GetWindowTextW
GetCursorPos
DrawIcon
GetIconInfo
GetClipboardData
ExitWindowsEx
GetForegroundWindow
GetKeyboardState
CloseDesktop
GetClassNameW
GetMessageA
CloseWindowStation
GetDlgItem
OpenWindowStationA
OpenDesktopA
GetMessageW
GetWindowLongW
MsgWaitForMultipleObjects
kernel32
IsBadReadPtr
GetCurrentThreadId
SystemTimeToFileTime
WideCharToMultiByte
DeleteFileW
HeapAlloc
GetTempFileNameW
GetLocalTime
EnterCriticalSection
GetCurrentProcessId
GetTickCount
GetCommandLineA
GetLogicalDrives
WriteProcessMemory
MapViewOfFile
SetEvent
SetFilePointer
lstrcatA
Sleep
SetFileTime
GlobalLock
CreateThread
LeaveCriticalSection
CreateMutexW
GetTimeZoneInformation
CreateFileW
lstrcpynW
MultiByteToWideChar
GetProcessTimes
GetFileTime
SetThreadPriority
lstrcpyW
GetModuleHandleA
FlushFileBuffers
OpenMutexW
SetFileAttributesW
GetDriveTypeW
FindNextFileW
MoveFileExW
lstrlenW
GetExitCodeProcess
InitializeCriticalSection
GetFileSizeEx
UnmapViewOfFile
CopyFileW
GetComputerNameW
FindFirstFileW
lstrcmpiA
ExpandEnvironmentStringsW
SetLastError
CreateDirectoryW
GetModuleFileNameW
WriteFile
CreateEventW
HeapReAlloc
GlobalUnlock
GetVersionExW
Sections
.bcd Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mfmp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.unef Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ