Static task
static1
Behavioral task
behavioral1
Sample
4cd544cd78acc1e11743c29afe396611.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cd544cd78acc1e11743c29afe396611.exe
Resource
win10v2004-20231215-en
General
-
Target
4cd544cd78acc1e11743c29afe396611
-
Size
302KB
-
MD5
4cd544cd78acc1e11743c29afe396611
-
SHA1
d8dfd1e1375ce238605511c43ac5118837a086cb
-
SHA256
bf57db741000b613ad8f6b4fe9456740328fe0295a427b45d5cad3af7ae6d41f
-
SHA512
55c3a75ba4bc76e16afdaaeb0d20c31937dcd6a116699a4c753a7c7e51f948b43d2ce581e58a2a0d073c53d18294ad4b694b1920b3cee005d697f246350f263c
-
SSDEEP
6144:dyU1iIVeAiAAyWOPbNzt+1jeqsVtyekgCUHtKRGzeJWeVGnX:dHiFT1yWOP1U1EVtyekgptKce3Mn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cd544cd78acc1e11743c29afe396611
Files
-
4cd544cd78acc1e11743c29afe396611.exe windows:4 windows x86 arch:x86
5e37833458061655819c65127ad796cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SheChangeDirA
SHFileOperationA
FindExecutableW
DoEnvironmentSubstW
SHFormatDrive
user32
WinHelpW
GetMenu
SystemParametersInfoA
ToAsciiEx
RegisterClassExA
MapVirtualKeyW
GetDlgItem
SetMessageQueue
BroadcastSystemMessageA
UnhookWindowsHookEx
LoadMenuIndirectW
DrawCaption
GetWindowTextA
ToUnicode
GetTopWindow
IsZoomed
RealGetWindowClass
RealChildWindowFromPoint
RegisterClassA
GetTabbedTextExtentW
CountClipboardFormats
SetWindowTextA
EnumDisplaySettingsW
DdeUnaccessData
DlgDirListA
advapi32
LookupPrivilegeNameW
CryptReleaseContext
LookupAccountNameA
CryptVerifySignatureA
InitiateSystemShutdownA
RegEnumValueW
RegQueryValueA
RegCloseKey
comctl32
InitCommonControlsEx
kernel32
ReadFile
GetModuleFileNameA
GetConsoleMode
GetDateFormatA
VirtualQuery
CompareStringA
GetConsoleCP
SetConsoleCtrlHandler
SetEnvironmentVariableA
FlushFileBuffers
WideCharToMultiByte
InitializeCriticalSection
EnterCriticalSection
GetLocaleInfoW
GetTimeFormatA
SetUnhandledExceptionFilter
IsValidLocale
VirtualFree
WriteFile
SetHandleCount
CreateFileA
LoadLibraryA
GetStringTypeW
HeapDestroy
GetStartupInfoW
TlsSetValue
TlsAlloc
GetModuleHandleA
HeapFree
CreateEventW
MultiByteToWideChar
CompareStringW
InterlockedDecrement
HeapReAlloc
GetCurrentThread
WaitNamedPipeA
GetConsoleOutputCP
GetVersionExA
GetSystemInfo
RtlUnwind
FreeLibrary
CreateMutexA
LCMapStringA
GetACP
GetLastError
GetCurrentProcess
SetLastError
WriteConsoleOutputCharacterA
SetStdHandle
HeapAlloc
GetProcessHeap
GetProcAddress
GetEnvironmentStrings
GetStartupInfoA
ExitProcess
GetLocaleInfoA
GetSystemTimeAsFileTime
HeapCreate
LCMapStringW
DeleteCriticalSection
OpenMutexA
GetEnvironmentStringsW
lstrcat
GlobalCompact
QueryPerformanceCounter
VirtualAlloc
TlsFree
HeapSize
WriteConsoleW
GetStdHandle
InterlockedExchange
GetFileType
GetUserDefaultLCID
Sleep
IsValidCodePage
GetModuleFileNameW
WaitForSingleObjectEx
WriteConsoleA
ReadConsoleW
GetExitCodeThread
GetOEMCP
FreeEnvironmentStringsW
GlobalGetAtomNameA
FillConsoleOutputAttribute
TlsGetValue
GetTickCount
TerminateProcess
GetStringTypeA
FreeEnvironmentStringsA
GetTimeZoneInformation
SetFilePointer
GetCommandLineW
InterlockedIncrement
LeaveCriticalSection
GetCurrentProcessId
GetCPInfo
GetExitCodeProcess
MapViewOfFile
CloseHandle
HeapValidate
IsDebuggerPresent
GetSystemDefaultLangID
GlobalFindAtomA
UnhandledExceptionFilter
GetCommandLineA
EnumSystemLocalesA
GetCurrentThreadId
comdlg32
ChooseColorW
GetFileTitleW
PageSetupDlgA
LoadAlterBitmap
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ