Static task
static1
Behavioral task
behavioral1
Sample
4d3a4983649664f0d788ad6efc6c8a5c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d3a4983649664f0d788ad6efc6c8a5c.exe
Resource
win10v2004-20231215-en
General
-
Target
4d3a4983649664f0d788ad6efc6c8a5c
-
Size
650KB
-
MD5
4d3a4983649664f0d788ad6efc6c8a5c
-
SHA1
8701fb3aecac72d92eb7846465c6857846ba436a
-
SHA256
9010123b1a089e002dd3860f75829a4e057816eb15b7499ad6528f3be923e445
-
SHA512
4dd43057b87fea795036f4c2b4ed706b82a8e3eee4e4bcf8104f505304c477944493858e115199f87629625817e701489c990c26a18f343071524f41436804bc
-
SSDEEP
12288:YjkTCxrskWq7dRPKNUB2dMa3JLi779XzZt58eKpieycV74S6:4kTyrsF2RPMLi7Lv8eKDV7a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d3a4983649664f0d788ad6efc6c8a5c
Files
-
4d3a4983649664f0d788ad6efc6c8a5c.exe windows:4 windows x86 arch:x86
d52a0dbfe4d7c400807f955af2693480
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultLangID
FindClose
FindFirstFileW
GetLocaleInfoA
GetVolumeInformationW
GetFullPathNameW
CreateFileW
SetErrorMode
GetVersionExW
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
RtlUnwind
HeapValidate
IsBadReadPtr
RaiseException
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetStdHandle
msvcrt
_iob
_initterm
pow
fprintf
?terminate@@YAXXZ
free
exp
_initterm
malloc
_adjust_fdiv
exit
_CIpow
_ftol
__CxxFrameHandler
_purecall
_except_handler3
msvfw32
ICInfo
ICOpen
ICSendMessage
ICClose
ICGetInfo
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ