Static task
static1
Behavioral task
behavioral1
Sample
4c5f86160bcce6e8c2c44700d0147e75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c5f86160bcce6e8c2c44700d0147e75.exe
Resource
win10v2004-20231215-en
General
-
Target
4c5f86160bcce6e8c2c44700d0147e75
-
Size
60KB
-
MD5
4c5f86160bcce6e8c2c44700d0147e75
-
SHA1
2ff3ef74efdec954fdd32bb0adff96a76966226a
-
SHA256
0f188958848c75dc31fe6baf03bce4430cd48331046519df20ed14fd6341b039
-
SHA512
a093ed1e1698d7822308cb27bba0edd4194d222d16db833720dfe42e3b7f9b7425f2df7e560ec8b0cef4ab719464da7c27b8232001eb1730f17370c920ec3748
-
SSDEEP
768:g5NInO/1B3z5jKIpI/GWwv6wKOM5/XYSRa27rioj5HHJNYX8kIfXcaFJKOy:kNr4Iqnwy5XYSRakRJSX83vph
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c5f86160bcce6e8c2c44700d0147e75
Files
-
4c5f86160bcce6e8c2c44700d0147e75.exe windows:4 windows x86 arch:x86
1c998c0c9f2bccc471cd9d0159024c47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
MoveFileA
Sleep
DeleteFileA
GetTempPathA
GetLastError
lstrcpynA
GetLocalTime
GetModuleFileNameA
GetTempFileNameA
lstrcatA
CloseHandle
CreateFileA
WriteFile
ReadFile
lstrlenA
lstrcpyA
GetVersionExA
GetTickCount
user32
wsprintfA
advapi32
ControlService
StartServiceA
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
strlen
fopen
fwrite
memset
free
malloc
fclose
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE