Static task
static1
Behavioral task
behavioral1
Sample
4ac9408ad663401e1f7b4577c0c49b3d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ac9408ad663401e1f7b4577c0c49b3d.exe
Resource
win10v2004-20231215-en
General
-
Target
4ac9408ad663401e1f7b4577c0c49b3d
-
Size
62KB
-
MD5
4ac9408ad663401e1f7b4577c0c49b3d
-
SHA1
ce8a952e6dfc181ef2463be9e08be9db67c991f7
-
SHA256
57457218527428809f120bae935ebf00dd4052b925c698bc2afdae9b2e293be6
-
SHA512
359739c820e1d067ead119eba8138d28e3bc5193cc268255c6425b9bcbda385944a298873f8a11ba9fab0d707c2c78aeae14189724dfb3f6496cbe707f0a8018
-
SSDEEP
1536:kPO5ATu7pG1lJengPFnToIQE1rQBGjFVGPQ:OOetHengPtTBQEJQBOFYPQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ac9408ad663401e1f7b4577c0c49b3d
Files
-
4ac9408ad663401e1f7b4577c0c49b3d.exe windows:4 windows x86 arch:x86
cae0599ca15e71a878a6993fa90f61d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2915
ord1158
ord540
ord860
ord535
ord858
ord800
ord823
ord825
msvcrt
strcspn
strncat
strncpy
sprintf
__CxxFrameHandler
_ftol
exit
strstr
malloc
rand
srand
time
free
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
kernel32
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
HeapAlloc
InterlockedExchange
Sleep
ReadFile
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CloseHandle
CreatePipe
FindClose
FindNextFileA
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
DeleteFileA
CopyFileA
MoveFileA
FreeLibrary
GetProcAddress
LoadLibraryA
WinExec
GetTempPathA
GetCurrentProcess
TerminateProcess
OpenProcess
Process32Next
GetPriorityClass
Module32First
Process32First
CreateToolhelp32Snapshot
GetTickCount
SetThreadPriority
GetCurrentThread
WriteFile
CreateFileA
GetFileSize
CreateThread
lstrcpyA
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
ResumeThread
SetPriorityClass
lstrcatA
GetEnvironmentVariableA
GetModuleFileNameA
lstrlenA
GetShortPathNameA
user32
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
keybd_event
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetSystemMetrics
IsWindow
SendMessageA
SetCursorPos
OpenWindowStationA
wsprintfA
CloseWindow
CreateWindowExA
mouse_event
ExitWindowsEx
gdi32
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
DeleteDC
CreateDCA
BitBlt
advapi32
StartServiceA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
CloseServiceHandle
AdjustTokenPrivileges
OpenServiceA
CreateServiceA
OpenSCManagerA
RegOpenKeyExA
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
shell32
SHGetFileInfoA
ShellExecuteA
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
ws2_32.dll�
ord21
ord19
ord16
ord52
ord11
ord115
ord3
ord4
ord23
ord9
ord22
ord20
WSASocketA
ord8
ord57
ord12
WSAIoctl
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ