Static task
static1
Behavioral task
behavioral1
Sample
4d6c651400cafe933d092c395ea274ec.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4d6c651400cafe933d092c395ea274ec.exe
Resource
win10v2004-20231215-en
General
-
Target
4d6c651400cafe933d092c395ea274ec
-
Size
290KB
-
MD5
4d6c651400cafe933d092c395ea274ec
-
SHA1
3f93146bc2c563b1cc140b9c23df8d1229a2ade6
-
SHA256
c61f5ec99197c07698fb0e33bec2195ecd847a38ae68026001f6bec83ae6ed5c
-
SHA512
3a59103e5bcecde5951838116c3d6a29926206bb0742de30b81acde98aa0f9e92b9032afeed143f781871151560191d06f278b80cf8e960c0d1031826987a4ac
-
SSDEEP
6144:vLYbHvQL2RPywh/am474V2yrTJUW99cJVLhZOwCcsc1apzXep8ySu6:vLiHIL2RqwhCm4744yrTJUWoJVRCcska
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d6c651400cafe933d092c395ea274ec
Files
-
4d6c651400cafe933d092c395ea274ec.exe windows:4 windows x86 arch:x86
280ac1e4c108d5c98613d9ce76973e74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetLastError
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
CloseHandle
WriteFile
CreateFileA
ReadFile
SetFilePointer
GetFileSize
GetSystemDirectoryA
MultiByteToWideChar
TransactNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
LoadLibraryA
GetProcAddress
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetComputerNameA
CopyFileA
GetCurrentProcess
TerminateProcess
OpenProcess
DeleteFileA
GetCurrentProcessId
WaitForSingleObject
CreateMutexA
TerminateThread
MoveFileA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
SetConsoleCtrlHandler
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
WaitForMultipleObjects
GenerateConsoleCtrlEvent
GlobalMemoryStatus
CompareStringW
CompareStringA
GetLocaleInfoW
SetEnvironmentVariableA
SetEndOfFile
GetTimeZoneInformation
IsBadCodePtr
SetUnhandledExceptionFilter
SetStdHandle
InterlockedExchange
InitializeCriticalSection
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetStringTypeA
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetSystemTimeAsFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetLastError
GetCurrentThread
FlushFileBuffers
FatalAppExitA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
VirtualProtect
GetSystemInfo
VirtualQuery
ws2_32
inet_addr
connect
WSACleanup
WSAStartup
socket
setsockopt
ioctlsocket
htons
bind
listen
select
send
accept
recv
closesocket
__WSAFDIsSet
Sections
.text Size: 217KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 643KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE