Static task
static1
Behavioral task
behavioral1
Sample
49a4d90d0d65d7fa71655ac93db386d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49a4d90d0d65d7fa71655ac93db386d7.exe
Resource
win10v2004-20231222-en
General
-
Target
49a4d90d0d65d7fa71655ac93db386d7.exe
-
Size
532KB
-
MD5
49a4d90d0d65d7fa71655ac93db386d7
-
SHA1
ddbf3eeae875c89ebe8349e8d92a3d8cbecc59c2
-
SHA256
9e3f4bfcfd053c0f6288c87e76ab616feaa8beb7039c4dc3539cfcfea11652e7
-
SHA512
c45809fbb5d9c982ddb12842e671568a0af225a4cdb658c6c5e0d71c70f3fde877a1e4eb50c88420ac3ee9c0acb8ceaae72976569760bf0e9c32ec352f669ac8
-
SSDEEP
12288:msjroZpuLv35Df8Mgml/brYiY81Q5bo9Fi28P:5XYQ3VUcl7bQ5bg+P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49a4d90d0d65d7fa71655ac93db386d7.exe
Files
-
49a4d90d0d65d7fa71655ac93db386d7.exe.exe windows:5 windows x86 arch:x86
86cced209b14e2818982fb484c553b13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
lstrlenA
WritePrivateProfileStructA
GetModuleHandleExA
SetLocalTime
GetDriveTypeW
SetEndOfFile
_lwrite
InterlockedDecrement
WritePrivateProfileSectionA
CreateDirectoryW
GetProfileSectionA
SetVolumeMountPointW
OpenSemaphoreA
GetModuleHandleW
ReadConsoleW
EnumTimeFormatsA
CreateActCtxW
CreateDirectoryExW
GetPriorityClass
GlobalAlloc
GetVolumeInformationA
LoadLibraryW
GetConsoleMode
Sleep
ReadConsoleInputA
CopyFileW
_hread
GetPrivateProfileStructW
GetVersionExW
GetComputerNameExA
SetConsoleMode
Beep
SetConsoleCursorPosition
WriteConsoleW
GetBinaryTypeA
TerminateProcess
GetAtomNameW
ReadFile
GetModuleFileNameW
CreateFileW
CompareStringW
GetACP
FillConsoleOutputCharacterA
VerifyVersionInfoW
GlobalUnfix
FindFirstFileA
GetCPInfoExW
OpenMutexW
GetHandleInformation
GetLastError
IsDBCSLeadByteEx
GetCurrentDirectoryW
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
IsValidCodePage
CopyFileA
SetComputerNameA
BuildCommDCBW
ResetEvent
ProcessIdToSessionId
UnhandledExceptionFilter
OpenWaitableTimerW
GetFileType
IsSystemResumeAutomatic
AddAtomW
SetCurrentDirectoryW
GetCommMask
SetSystemTime
SetEnvironmentVariableA
WTSGetActiveConsoleSessionId
CreateIoCompletionPort
FreeEnvironmentStringsW
CompareStringA
SetCalendarInfoA
_lopen
ReadConsoleInputW
LocalSize
TlsFree
LCMapStringW
CopyFileExA
CloseHandle
SetStdHandle
GetConsoleCP
SetFilePointer
RaiseException
SetConsoleTitleA
GetTempFileNameW
MoveFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
InterlockedIncrement
DecodePointer
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
TlsAlloc
TlsGetValue
TlsSetValue
SetLastError
HeapCreate
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
OutputDebugStringA
OutputDebugStringW
IsProcessorFeaturePresent
FlushFileBuffers
user32
GetCursorInfo
GetListBoxInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
AdjustTokenPrivileges
Sections
.text Size: 441KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ