Static task
static1
Behavioral task
behavioral1
Sample
48fbdbff423bb5803f8798b393fbbf6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48fbdbff423bb5803f8798b393fbbf6f.exe
Resource
win10v2004-20231222-en
General
-
Target
48fbdbff423bb5803f8798b393fbbf6f.exe
-
Size
328KB
-
MD5
48fbdbff423bb5803f8798b393fbbf6f
-
SHA1
b15ff8465b49c282eec7af6716430c487c2514a6
-
SHA256
42df01837ed429b40e4c07a5e48306f772d9f649b9655c8cabb23b330fbbaac1
-
SHA512
02da55d92db624a5726604301a4e6d382f2915d1b12e7a0904556d015e5960a400b69c5c3abea26ad5bf9ce38c0f24d859b7ca900f3188e996a31c903c715b2b
-
SSDEEP
6144:sAK8PwjNi1eM3OcQ7C5ytkvG6hQOAtEiWSbj8Tg9tyE7ejCd4aa:N9Y5ioSsC5+BIK4Tg9EEigR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48fbdbff423bb5803f8798b393fbbf6f.exe
Files
-
48fbdbff423bb5803f8798b393fbbf6f.exe.exe windows:4 windows x86 arch:x86
c72760f51da67c2a3f807c01ce5e40df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
GetSystemTime
GetComputerNameA
GetCommandLineW
CreateThread
PulseEvent
GetCurrentDirectoryA
CloseHandle
GetConsoleTitleA
SetLastError
HeapCreate
Sleep
CreateFileA
LoadLibraryW
GetModuleHandleA
lstrlenA
SetEvent
GetTickCount
LocalFree
UnmapViewOfFile
user32
GetDC
IsWindow
GetKeyState
SetFocus
GetDlgItem
CallWindowProcA
DrawMenuBar
DispatchMessageA
DrawEdge
CreateWindowExA
FillRect
GetScrollBarInfo
CheckRadioButton
clbcatq
DowngradeAPL
CheckMemoryGates
SetupOpen
UpdateFromAppChange
SetSetupOpen
desk.cpl
InstallScreenSaver
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ