fRhXmbc0VJ@20
Static task
static1
Behavioral task
behavioral1
Sample
4b8d73eb611cbedb3f9bb17c9d6001e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b8d73eb611cbedb3f9bb17c9d6001e3.exe
Resource
win10v2004-20231215-en
General
-
Target
4b8d73eb611cbedb3f9bb17c9d6001e3
-
Size
94KB
-
MD5
4b8d73eb611cbedb3f9bb17c9d6001e3
-
SHA1
d89cc90b30adaaa9023a96459f6ac22d1f3d273a
-
SHA256
c5c894100e8b216c7e7a04e4ce31572a3f5ca65e6d79c2ee1d23daf64a0db7d5
-
SHA512
1098ce19b68153c135a34ab818c59a956505d53174fc0f7e709894496e87c713727c2fbb94dbdaa404e03a391e71ec905e54c788c691c7dc1ff991c4a7409dc2
-
SSDEEP
1536:Y7LLJnEIdGY16Vlqy936E/rKChIKFZWR3cKZIjXa2Tl4m+:mJEhVlqOKEmCh/DKcS2OT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b8d73eb611cbedb3f9bb17c9d6001e3
Files
-
4b8d73eb611cbedb3f9bb17c9d6001e3.exe windows:4 windows x86 arch:x86
53fb794ca00227146be0db77071a0a9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
SetHandleCount
ExitProcess
FindFirstFileA
GetModuleHandleA
lstrcmpiA
LocalReAlloc
lstrcmpA
VirtualQuery
SetLastError
GetUserDefaultLCID
IsBadHugeReadPtr
GetCurrentThread
DeleteCriticalSection
GetCommandLineA
GetDateFormatA
LocalFree
FreeLibrary
FormatMessageA
ResetEvent
SetErrorMode
lstrcpyA
LoadLibraryA
user32
IntersectRect
GetActiveWindow
GetWindowDC
GetSystemMenu
CharNextW
SetClassLongA
EnableWindow
LoadStringA
SetScrollRange
KillTimer
IsWindowEnabled
GetKeyboardLayout
ChildWindowFromPoint
GetWindowTextLengthA
CreateIcon
FrameRect
EnableMenuItem
ActivateKeyboardLayout
GetScrollPos
OpenIcon
GetSysColorBrush
IsIconic
CallNextHookEx
GetClassNameA
PostQuitMessage
SetWindowTextA
EqualRect
UnregisterClassA
GetMenu
GetKeyState
GetMenuItemCount
CheckMenuItem
SetWindowLongA
ClientToScreen
GetMenuState
CallWindowProcA
ReleaseDC
GetClientRect
SetWindowPos
SetCursor
GetKeyboardType
GetMenuStringA
CharNextA
GetSubMenu
CharUpperBuffA
GetLastActivePopup
LoadKeyboardLayoutA
IsMenu
CharLowerA
CharUpperA
GetWindowPlacement
InflateRect
UnhookWindowsHookEx
GetParent
PtInRect
GetPropA
IsZoomed
GetSysColor
DispatchMessageA
CharToOemA
SetTimer
OpenClipboard
OffsetRect
MapVirtualKeyA
gdi32
LineTo
shell32
SHFileOperationA
Shell_NotifyIconA
SHGetDiskFreeSpaceA
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dadata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ