Static task
static1
Behavioral task
behavioral1
Sample
4c7558f078aa2119fb78e2788cfb1056.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c7558f078aa2119fb78e2788cfb1056.exe
Resource
win10v2004-20231215-en
General
-
Target
4c7558f078aa2119fb78e2788cfb1056
-
Size
49KB
-
MD5
4c7558f078aa2119fb78e2788cfb1056
-
SHA1
3a1b510ce5391bdd9c6d8a0d08a9267fa311f11c
-
SHA256
dc102a1ac3782596d8692408904e8dd2f2f9b2c1c9da459e90aa55df98d23cd2
-
SHA512
1f1c3793d10517ad8f5446d7aae22746a5261bf9a5ac2d42cc64e76601c025b175aa3c8f45b585f99fc2afc3be851867ac6e321def7efe5dd13de8123789a2b0
-
SSDEEP
768:k0PIsNReNwyS6j4t3s6Ku1E7tMh4kiAXPcpMr68jGT9OIofI06CFhK1MYlP6hWKC:k0PIkJ6jGtEWmA/vr6B8ImI062hK1N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c7558f078aa2119fb78e2788cfb1056
Files
-
4c7558f078aa2119fb78e2788cfb1056.exe windows:5 windows x86 arch:x86
a500993a6bb62a79b28777e0ec0a0b11
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowThreadProcessId
GetKeyboardState
GetClipboardData
PeekMessageW
GetDlgItemTextW
GetWindowTextW
GetMessageA
SendMessageW
GetDlgItem
GetMessageW
FindWindowExW
SetThreadDesktop
GetCursorPos
OpenWindowStationA
GetClassNameW
SetProcessWindowStation
ExitWindowsEx
GetDlgItemTextA
CharLowerBuffA
OpenDesktopA
DispatchMessageW
CloseWindowStation
ToUnicode
MsgWaitForMultipleObjects
LoadCursorW
GetKeyState
CloseDesktop
GetForegroundWindow
EndDialog
DrawIcon
GetIconInfo
GetWindowLongW
PeekMessageA
kernel32
HeapReAlloc
GlobalUnlock
SetEndOfFile
CreateMutexW
WideCharToMultiByte
GetThreadPriority
CreateDirectoryW
GetLastError
lstrcpyW
GetModuleHandleA
lstrcmpiW
FindResourceW
OpenProcess
GetCurrentThreadId
GetVersionExW
GetExitCodeProcess
UnmapViewOfFile
Sleep
lstrcatW
FindClose
CreateThread
InitializeCriticalSection
ReleaseMutex
GetModuleFileNameW
ResetEvent
WriteFile
CreateFileMappingW
GetTickCount
WaitForSingleObject
CreateFileW
GetTempFileNameW
GetLogicalDrives
DisconnectNamedPipe
lstrcpynW
CloseHandle
IsBadReadPtr
lstrlenW
lstrcpyA
HeapAlloc
EnterCriticalSection
SetFileAttributesW
lstrcatA
GetModuleFileNameA
SetFileTime
HeapFree
MultiByteToWideChar
MoveFileExW
GlobalLock
GetFileTime
GetCurrentProcessId
MapViewOfFile
CopyFileW
SetThreadPriority
lstrlenA
ExpandEnvironmentStringsW
CreateEventW
lstrcmpiA
GetDriveTypeW
Sections
.kvopmx Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vgdap Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.whiz Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ