Static task
static1
Behavioral task
behavioral1
Sample
4bfbd7320444791de9ffb798a7ece41c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4bfbd7320444791de9ffb798a7ece41c.exe
Resource
win10v2004-20231215-en
General
-
Target
4bfbd7320444791de9ffb798a7ece41c
-
Size
296KB
-
MD5
4bfbd7320444791de9ffb798a7ece41c
-
SHA1
1a7a4c3ce1d5555379f824c7718df2df76fade3c
-
SHA256
ecd0e85d94e97bce4453a82b15ed5eccafc6155751947d1a3c52cef5e6c516a9
-
SHA512
b643098e7be9f6f2245867904a1d60cc794875ec3dcc04ed0053a7df775691ca939a879799b164da0a2c7cbaab7cc2c9825d83f4d1e3d3882e3f3e47723575ef
-
SSDEEP
6144:YkuW2qwF/aVApqtVZreyIaYD9LZylN+3woyR8tRnBwitmHR1:YQwF/HoYDYg8aRmw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bfbd7320444791de9ffb798a7ece41c
Files
-
4bfbd7320444791de9ffb798a7ece41c.exe windows:4 windows x86 arch:x86
09b4b1320ded7afcccaa1cb040f5ba69
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
GetFileInformationByHandle
GetBinaryTypeA
LoadResource
GetConsoleCursorMode
GetCommMask
VirtualProtectEx
SetTimerQueueTimer
GetStringTypeA
GetProcessAffinityMask
GetConsoleAliasesA
GetThreadLocale
ReadFile
GetThreadIOPendingFlag
GetTickCount
WriteConsoleInputA
WritePrivateProfileSectionA
EndUpdateResourceA
GlobalGetAtomNameA
Process32First
GetVersionExA
VirtualQuery
SetEvent
VirtualAllocEx
GetProfileStringA
GetWindowsDirectoryA
FillConsoleOutputAttribute
SetVolumeMountPointA
GetBinaryType
ReadConsoleOutputAttribute
SetEndOfFile
DebugBreak
ReadConsoleOutputA
GetComputerNameA
ReplaceFileA
GetCurrentDirectoryA
SetFilePointerEx
HeapUnlock
GetPrivateProfileIntA
MapViewOfFile
CreateFileMappingW
GetCommandLineA
FlushFileBuffers
OpenSemaphoreA
GetVersionExA
SizeofResource
GetFileTime
IsValidCodePage
CreateFileMappingW
GetCurrencyFormatA
GetEnvironmentStringsA
GetPrivateProfileStringA
WriteProcessMemory
CreateSemaphoreA
OpenWaitableTimerA
GetProcessHeaps
WritePrivateProfileStructA
FindFirstFileExW
MoveFileExA
GetLocaleInfoA
GetThreadTimes
UpdateResourceA
GetFileAttributesExA
SetFileAttributesA
GetConsoleAliasesLengthW
SetLastConsoleEventActive
SetConsoleInputExeNameA
VerifyVersionInfoA
CreateDirectoryExW
PeekConsoleInputA
GetCurrentThreadId
WritePrivateProfileStringA
IsBadHugeWritePtr
GetDiskFreeSpaceExA
VirtualProtect
SetCalendarInfoA
GetStringTypeExA
SetThreadExecutionState
OpenWaitableTimerA
FindNextVolumeA
GetThreadSelectorEntry
PulseEvent
GetExitCodeThread
SetConsoleActiveScreenBuffer
SetFilePointerEx
HeapCreate
_hread
TerminateProcess
TerminateJobObject
WaitForSingleObjectEx
ClearCommError
SetCommConfig
lstrlenA
GetProcessTimes
WriteConsoleA
ReadConsoleInputA
LoadModule
GetSystemTime
SetFilePointer
SetConsoleFont
GetExpandedNameA
MapUserPhysicalPages
CreateFileMappingW
HeapFree
IsSystemResumeAutomatic
GetConsoleInputExeNameA
GetVolumePathNameA
WriteConsoleInputA
GlobalSize
GetProcessIoCounters
SetThreadAffinityMask
GetLogicalDriveStringsA
SetCurrentDirectoryA
LocalHandle
GetVolumePathNameA
GetTickCount
GetEnvironmentVariableA
LocalUnlock
IsProcessorFeaturePresent
GetShortPathNameA
VerifyVersionInfoA
SetLocalPrimaryComputerNameA
LoadLibraryA
GetNamedPipeInfo
ExpandEnvironmentStringsA
ReadConsoleOutputCharacterA
PostQueuedCompletionStatus
SetConsoleNumberOfCommandsA
FindNextFileA
SetFileApisToOEM
TransmitCommChar
GetDefaultCommConfigA
ConnectNamedPipe
SetPriorityClass
Process32Next
GetVersionExA
OpenJobObjectA
WriteConsoleOutputCharacterA
ReleaseMutex
GetFileAttributesExA
GetModuleHandleA
GetLocaleInfoA
HeapCreate
ResetEvent
GlobalAddAtomA
OpenMutexA
GetConsoleSelectionInfo
GetConsoleKeyboardLayoutNameA
QueryPerformanceFrequency
GlobalFindAtomA
GetFileAttributesA
GetLocalTime
OpenMutexA
ReadConsoleOutputCharacterA
GetProcessIoCounters
LocalAlloc
LZRead
SetFileApisToANSI
GetConsoleMode
AddAtomA
GetDiskFreeSpaceExA
FlushConsoleInputBuffer
GetStdHandle
GetSystemDefaultLangID
SetTimeZoneInformation
GetProcessHandleCount
OpenEventA
DeleteTimerQueue
GetCurrentConsoleFont
BeginUpdateResourceA
DisconnectNamedPipe
Process32Next
CancelWaitableTimer
SetTimeZoneInformation
FreeLibrary
ReadConsoleA
GetNativeSystemInfo
user32
ReasonCodeNeedsComment
BroadcastSystemMessageExW
GetSubMenu
SetDeskWallpaper
EnumWindowStationsA
IsCharAlphaNumericA
IsDialogMessageA
UnregisterUserApiHook
SetClipboardData
GetMenuInfo
UnregisterMessagePumpHook
DrawMenuBarTemp
SetProcessDefaultLayout
SetProcessWindowStation
SetMessageQueue
CopyRect
EnableWindow
InflateRect
GetWindow
TabbedTextOutA
RealGetWindowClassA
EnumPropsExA
CreateSystemThreads
DlgDirSelectExA
BroadcastSystemMessageExA
GetMenuInfo
CallMsgFilterA
GetDlgItemTextA
CharToOemA
InvertRect
IsZoomed
CharToOemA
DefMDIChildProcA
RegisterShellHookWindow
RegisterRawInputDevices
CopyRect
GetClassInfoExA
GetQueueStatus
SetClassWord
GetWindowContextHelpId
CharLowerBuffA
GetDoubleClickTime
DrawTextA
SetLayeredWindowAttributes
GetMessageTime
GetKeyNameTextA
BeginPaint
ClipCursor
LoadKeyboardLayoutA
CheckMenuRadioItem
ModifyMenuA
MessageBeep
GetMouseMovePointsEx
SetProgmanWindow
SetMenu
GetSysColorBrush
SetCapture
SetMessageExtraInfo
IsWinEventHookInstalled
GetScrollInfo
IsWindow
ReasonCodeNeedsComment
EnumChildWindows
CheckMenuRadioItem
GetWindowTextA
PaintMenuBar
SetForegroundWindow
LoadBitmapA
CheckMenuRadioItem
SetSystemCursor
SetTimer
GetWindowRect
SetFocus
UnpackDDElParam
AppendMenuA
DisplayExitWindowsWarnings
SetDlgItemTextA
SendDlgItemMessageA
CascadeChildWindows
TranslateAcceleratorA
SetParent
GetTitleBarInfo
GetKBCodePage
SetRectEmpty
advapi32
IsValidSid
Sections
.itext Size: - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 180KB - Virtual size: 502KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ