Static task
static1
Behavioral task
behavioral1
Sample
4cf92efa7e5ea17d827aa5c4a5b37524.exe
Resource
win7-20231215-en
General
-
Target
4cf92efa7e5ea17d827aa5c4a5b37524
-
Size
112KB
-
MD5
4cf92efa7e5ea17d827aa5c4a5b37524
-
SHA1
dd9cea7036135d9f78a0aac1df2f550f01a2d023
-
SHA256
e223d28039a42e5fe95266a24fa6c577eff9aeb0bac766980cd5dcb1f145f7ce
-
SHA512
3fd87705820831664de7dcbe8df25aa8dce6adab64d97557ea2a2a94ed12997fac4ef0ac9c3189fbe5492ae261e937c1339c43ab859ad0d9c93038f723666237
-
SSDEEP
3072:7tEr/KyQ6bAzPrAgfiZl2CV+QHCKTkV4:WrjurUHZtHlTkV4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cf92efa7e5ea17d827aa5c4a5b37524
Files
-
4cf92efa7e5ea17d827aa5c4a5b37524.exe windows:4 windows x86 arch:x86
c72827b0a6dddbb700f3afd94729f3e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
sprintf
memmove
strncpy
strlen
strcpy
strcat
fopen
malloc
free
fclose
localtime
mktime
_strnicmp
gmtime
fabs
ceil
floor
pow
exit
__p__iob
fprintf
fwrite
fflush
ferror
getenv
sscanf
fmod
sin
cos
abs
kernel32
GetModuleHandleA
HeapCreate
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
HeapDestroy
ExitProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
GetWindowsDirectoryA
GetComputerNameA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
GetEnvironmentVariableA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
Sleep
WideCharToMultiByte
FreeLibrary
LoadLibraryA
GetProcAddress
FindClose
FindFirstFileA
GetLastError
FindNextFileA
CopyFileA
GetFileAttributesA
CreateDirectoryA
WriteFile
CreateFileA
SetFilePointer
GetLocalTime
TlsAlloc
TlsSetValue
GetVersionExA
HeapReAlloc
comctl32
InitCommonControls
InitCommonControlsEx
user32
GetDesktopWindow
GetDC
GetSystemMetrics
ReleaseDC
DestroyWindow
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetWindowRect
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
CharLowerA
CharUpperA
DestroyIcon
FillRect
GetIconInfo
DrawIconEx
gdi32
GetDeviceCaps
BitBlt
DeleteObject
GetStockObject
GetObjectType
GetObjectA
CreateCompatibleDC
SelectObject
DeleteDC
GdiSetBatchLimit
GdiGetBatchLimit
CreateDIBSection
GetDIBits
CreateBitmap
SetPixel
GetTextExtentPoint32A
SetBkMode
SetTextAlign
SetBkColor
SetTextColor
TextOutA
SetStretchBltMode
SetBrushOrgEx
StretchBlt
GetPixel
CreateFontIndirectA
GetTextMetricsA
CreateCompatibleBitmap
advapi32
RegOpenKeyA
RegConnectRegistryA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
shell32
ShellExecuteExA
ole32
RevokeDragDrop
CoInitialize
wsock32
closesocket
WSACleanup
WSAStartup
gethostname
gethostbyname
winmm
timeBeginPeriod
timeEndPeriod
iphlpapi
GetAdaptersInfo
Sections
.code Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ