Static task
static1
Behavioral task
behavioral1
Sample
4a99e1bb4872f8af3b6fe1af495bd45c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a99e1bb4872f8af3b6fe1af495bd45c.exe
Resource
win10v2004-20231215-en
General
-
Target
4a99e1bb4872f8af3b6fe1af495bd45c
-
Size
21KB
-
MD5
4a99e1bb4872f8af3b6fe1af495bd45c
-
SHA1
6627d724a174f8b2d1de3dc481421565d6349e13
-
SHA256
a040321f4bfd0c4b75627e959cc85e46a5bb0ec05d8f2ad72d90f4a42dd67483
-
SHA512
04752c47329c6915e6b7de7eabf59b9d13968f89400baaa8e6182c4b33f4c398b35d5ce60e6dd76bb4dafb7543ca7f50c3eeac888bba8d54c52853308cd4b214
-
SSDEEP
384:deLDLGXrKzpllHiFEh801dvGp/SnjYCfn+oI/FffXZzoHWHh:oLp1PiF3p4jrnYftRHh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a99e1bb4872f8af3b6fe1af495bd45c
Files
-
4a99e1bb4872f8af3b6fe1af495bd45c.exe windows:4 windows x86 arch:x86
ff3357c629adaa00f6f0d86be23f113e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
GetFileTime
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetModuleHandleA
GetProcessHeap
ResumeThread
GetPriorityClass
OpenProcess
VirtualAlloc
VirtualFree
GetCurrentProcessId
SetLastError
CreateRemoteThread
GetProcAddress
FreeLibrary
GetVersionExA
GlobalMemoryStatus
CloseHandle
user32
CharLowerA
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE