Static task
static1
Behavioral task
behavioral1
Sample
4a8982b4b2f2f016ba537395143387a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a8982b4b2f2f016ba537395143387a0.exe
Resource
win10v2004-20231215-en
General
-
Target
4a8982b4b2f2f016ba537395143387a0
-
Size
168KB
-
MD5
4a8982b4b2f2f016ba537395143387a0
-
SHA1
2a52d5615fcc08cadbca6fd828a0ccd72cc475ec
-
SHA256
77f64fa12d470ff9aaafd618f668839777230aa9a01104e52124f1adefac870c
-
SHA512
e10aaa6457ef36b95d27082957000ebd02f4799db9581596b10cf7378dd03a4921066e48f4764af200b12eac3fd2168859e66cf688c95750ad9b1d420eb3114d
-
SSDEEP
3072:w9ec4/Nviz1SGpNBAL/MlELdfG47O+YwW0LfNOvxcMmMwwKsqtQIjZQScbqi:w+5iMGFALYELVG4K+YwW07ohltFteQSG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a8982b4b2f2f016ba537395143387a0
Files
-
4a8982b4b2f2f016ba537395143387a0.exe windows:4 windows x86 arch:x86
237d6fc0061f3f8136d29f156ef2a9e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
CommandLineToArgvW
kernel32
ReadFile
WriteFile
GetFileSize
SetFileAttributesW
lstrcpynW
lstrlenW
FreeLibrary
GetProcAddress
LoadLibraryW
MoveFileW
Sleep
GetCurrentProcess
GetExitCodeThread
WaitForSingleObject
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrcmpA
SetFilePointer
UpdateResourceW
BeginUpdateResourceW
WinExec
GetShortPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrcmpW
GetComputerNameW
GetLocalTime
GetSystemDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetTempPathW
GetVersionExW
lstrcmpiW
GetCommandLineW
SetErrorMode
CreateFileW
FormatMessageW
LocalAlloc
lstrcpyW
LocalFree
GetLastError
OpenProcess
CloseHandle
lstrlenA
GetStartupInfoA
GetModuleHandleA
EndUpdateResourceW
user32
wsprintfA
IsCharAlphaW
wsprintfW
advapi32
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegDeleteValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCreateKeyExW
wininet
InternetOpenW
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetCrackUrlW
shlwapi
StrRChrW
msvcrt
??2@YAPAXI@Z
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_CxxThrowException
strlen
??1type_info@@UAE@XZ
_onexit
memcpy
_lrotr
_lrotl
??3@YAXPAX@Z
__CxxFrameHandler
memset
__dllonexit
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ