Static task
static1
Behavioral task
behavioral1
Sample
4ccfa29322d5b822009d19fb69b2de1b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ccfa29322d5b822009d19fb69b2de1b.exe
Resource
win10v2004-20231222-en
General
-
Target
4ccfa29322d5b822009d19fb69b2de1b
-
Size
84KB
-
MD5
4ccfa29322d5b822009d19fb69b2de1b
-
SHA1
7bbc6b933db749248f618b3d06afcb1b51a57755
-
SHA256
72816291c363d1496079822e3b5e996c65ba757622d71e41c0fdb0c43f74a545
-
SHA512
4d7505450f6da2aa56483571b585d160ec693cfaaaacfd905ba31ca08d022f94494a61e6b9847e34fe88eb5f8af52009ad1e89f937deeeb81ab7c333b661b14a
-
SSDEEP
1536:CGygSm6pygETTaqvk4fUfKjIXHhjTBUhmCjoWoht5SvF7LHoB:NygSm6pygEXRDfUfp9ShmtT5I9LHoB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ccfa29322d5b822009d19fb69b2de1b
Files
-
4ccfa29322d5b822009d19fb69b2de1b.exe windows:4 windows x86 arch:x86
29fa9e2ae322a9bd887132a9acded7b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetCommandLineW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetModuleHandleA
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
HeapReAlloc
GetProcAddress
GetEnvironmentStringsW
GetEnvironmentStrings
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetStringTypeW
user32
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
GetSystemMetrics
GetMessageA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
TranslateAcceleratorA
advapi32
RegOpenKeyExA
shell32
StrRChrA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ