Static task
static1
Behavioral task
behavioral1
Sample
4a9274aca07d29d1edc27cdb09fbc85d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a9274aca07d29d1edc27cdb09fbc85d.exe
Resource
win10v2004-20231222-en
General
-
Target
4a9274aca07d29d1edc27cdb09fbc85d
-
Size
371KB
-
MD5
4a9274aca07d29d1edc27cdb09fbc85d
-
SHA1
44548d2661a94479bc813f012390fc1b972032c5
-
SHA256
9bb5e133dd3f137f0bb92856158b0d63d05741519551c42cb2b7ff6aa22c8bad
-
SHA512
0c501d544f714461b6424d69d334b0efcb49a4d7e4a98ee64e0f05086038c81d8cafb6eb8b028a3f20d116033a6f58b6fa39718af37994163f6b636b350d97ea
-
SSDEEP
6144:LUk0hVawgDslyMBWFjyZdQKPQBVEUU3iIioufoP9tvFd0ATXtcXS:wnawgcycTZp7TqouotL1TXCX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a9274aca07d29d1edc27cdb09fbc85d
Files
-
4a9274aca07d29d1edc27cdb09fbc85d.exe windows:4 windows x86 arch:x86
8773154ae07c5aa3fb9a461de29f860d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
FindTextW
GetOpenFileNameW
ReplaceTextW
ChooseFontA
comctl32
CreateMappedBitmap
ImageList_EndDrag
DestroyPropertySheetPage
InitCommonControlsEx
ImageList_Add
ImageList_SetDragCursorImage
ImageList_SetOverlayImage
ImageList_DragMove
ImageList_SetImageCount
CreatePropertySheetPageA
ImageList_Duplicate
ImageList_Destroy
ImageList_LoadImageA
ImageList_Read
ImageList_Copy
CreateUpDownControl
ImageList_SetFilter
ImageList_Remove
wininet
FindNextUrlCacheEntryA
InternetGetConnectedStateExW
RunOnceUrlCache
user32
DdeCreateStringHandleA
MessageBoxA
DestroyWindow
GetUserObjectInformationW
OemToCharW
DdeQueryNextServer
GetSysColorBrush
RegisterClassA
IsCharAlphaNumericW
DdeCreateDataHandle
CreateIcon
GrayStringW
ClipCursor
SetWindowPos
EnableWindow
CreateWindowExW
RegisterClassExA
ShowWindow
DefWindowProcA
GetKeyboardLayoutNameW
FindWindowExW
GetDlgItemInt
kernel32
EnumTimeFormatsA
GetStringTypeA
SetHandleCount
GetCurrentThread
IsValidCodePage
OpenMutexA
ReadFile
HeapDestroy
GetPrivateProfileSectionNamesA
SetEnvironmentVariableA
TerminateProcess
EnumSystemLocalesA
CommConfigDialogW
GetComputerNameA
UnmapViewOfFile
VirtualAlloc
VirtualFree
CreateToolhelp32Snapshot
LCMapStringW
FreeEnvironmentStringsW
MultiByteToWideChar
HeapFree
GetVersionExA
GetCurrentProcess
GetCurrentProcessId
HeapCreate
RemoveDirectoryW
GetPrivateProfileStringW
TlsAlloc
GetOEMCP
CloseHandle
GetCommandLineW
CompareStringW
FindResourceExW
FlushFileBuffers
GetNamedPipeHandleStateW
CreateMutexA
UnhandledExceptionFilter
GetDateFormatA
GetModuleFileNameA
IsValidLocale
GetModuleHandleA
GetProfileStringA
GetStringTypeW
GetLocaleInfoW
AddAtomW
ReadConsoleOutputCharacterW
FileTimeToLocalFileTime
SetFilePointer
SetSystemTime
HeapSize
GetStdHandle
GetStartupInfoA
CompareFileTime
TlsFree
GetTimeZoneInformation
GetSystemInfo
GetCurrentThreadId
SetLastError
GetFileType
GetDateFormatW
GetTickCount
HeapReAlloc
RtlUnwind
LoadLibraryA
QueryPerformanceCounter
FindResourceA
InterlockedExchange
HeapAlloc
GetCPInfo
Sleep
GetUserDefaultLCID
GetSystemTimeAdjustment
InitializeCriticalSection
IsBadWritePtr
CompareStringA
TlsGetValue
GetACP
FreeResource
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterW
WideCharToMultiByte
GetLocaleInfoA
ExitProcess
ReadConsoleInputW
GlobalFix
GetTimeFormatA
GetEnvironmentStringsW
OpenProcess
GetModuleFileNameW
TransactNamedPipe
GetProcAddress
GetSystemTimeAsFileTime
DeleteCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
GetCommandLineA
LCMapStringA
TlsSetValue
WriteProfileStringW
GetLastError
SetStdHandle
ExpandEnvironmentStringsA
SetThreadContext
VirtualQuery
FreeEnvironmentStringsA
GetProcessShutdownParameters
EnumResourceNamesA
GetEnvironmentStrings
GetStartupInfoW
WriteFile
shell32
SHFormatDrive
SHGetDesktopFolder
RealShellExecuteExA
gdi32
CopyEnhMetaFileA
CreateDCW
SetSystemPaletteUse
GetTextAlign
MoveToEx
CreateDIBitmap
EnumFontsW
SetDeviceGammaRamp
GetWindowExtEx
DeleteDC
CopyMetaFileA
GdiFlush
SetROP2
GetDeviceCaps
GetCharWidthA
CreateSolidBrush
GetBrushOrgEx
CreateBitmapIndirect
GetObjectW
GetEnhMetaFileHeader
InvertRgn
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ