Static task
static1
Behavioral task
behavioral1
Sample
4d9b06586096fb697d3ae3651eb47428.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d9b06586096fb697d3ae3651eb47428.exe
Resource
win10v2004-20231215-en
General
-
Target
4d9b06586096fb697d3ae3651eb47428
-
Size
593KB
-
MD5
4d9b06586096fb697d3ae3651eb47428
-
SHA1
e72e43d9ed3c2666baafaf190f7e57978a378067
-
SHA256
f17094f881935ed46c07da34dd0f1b400560d6563ce1ed9e8a9ecf33761dd545
-
SHA512
c44db7198e4a9b339c1aac7a39ffce0f7c5346100c58a68f6ac559e2fd4fdc5f4cecdf68920573a94beb9ab46e69bf904daf4fa8b40baaba5de8132c8ba357b5
-
SSDEEP
12288:bZQxNlalAEaUnxanHNjWqn6WkyBeLgIQlj8/7yHt31REpJBJhi:bZQxNlalJaTNjW+6fahp1RUt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d9b06586096fb697d3ae3651eb47428
Files
-
4d9b06586096fb697d3ae3651eb47428.exe windows:4 windows x86 arch:x86
374760a67a0099b6050c872d8c054497
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
GetProcAddress
LoadLibraryA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetStringTypeA
GetStringTypeW
SetStdHandle
SetEndOfFile
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
LoadResource
FindResourceW
LockResource
LocalFree
FormatMessageW
DuplicateHandle
HeapSize
UnlockFile
GetVolumeInformationW
GetFullPathNameW
GetThreadLocale
lstrcmpiW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
FreeLibrary
MulDiv
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalFlags
SetErrorMode
LocalAlloc
GlobalHandle
GlobalReAlloc
LocalReAlloc
GetProcessVersion
WritePrivateProfileStringW
GetTickCount
RaiseException
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetModuleFileNameA
VirtualFree
HeapCreate
HeapDestroy
GetCurrentThread
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameW
UnhandledExceptionFilter
HeapReAlloc
GetSystemTimeAsFileTime
CreateDirectoryW
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetCurrentProcess
TerminateProcess
InterlockedIncrement
InterlockedDecrement
RtlUnwind
HeapAlloc
HeapFree
ExitProcess
GetVersion
GetStartupInfoW
GetModuleHandleA
GetFileSize
GetDriveTypeW
GetCommandLineW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
GetVersionExW
DeviceIoControl
SetLastError
GetCurrentDirectoryW
SetCurrentDirectoryW
GetModuleHandleW
GetDiskFreeSpaceExW
GetTempPathW
RemoveDirectoryW
CreateFileW
ReadFile
SetFilePointer
CloseHandle
GetFileTime
SetFileAttributesW
WriteFile
SetFileTime
lstrcpynW
DeleteFileW
GetLastError
lstrlenW
GetFileAttributesW
lstrcpyW
lstrcatW
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LockFile
GetDriveTypeA
user32
UnregisterClassW
PostThreadMessageW
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableW
CharNextW
DestroyMenu
GetSysColorBrush
GetDesktopWindow
PtInRect
GetClassNameW
MapDialogRect
SetWindowContextHelpId
LoadStringW
GetMessageW
ValidateRect
GetCursorPos
PostQuitMessage
GrayStringW
DrawTextW
TabbedTextOutW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
MoveWindow
IsDialogMessageW
RegisterClipboardFormatW
SetDlgItemTextW
GetDlgItemTextW
PostMessageW
SendDlgItemMessageW
SendDlgItemMessageA
MapWindowPoints
GetSysColor
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
IsChild
GetCapture
WinHelpW
MessageBoxW
SendMessageW
CreateWindowExW
GetSystemMetrics
GetClientRect
ShowWindow
SetWindowTextW
GetClassInfoW
RegisterClassW
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthW
GetWindowTextW
GetDlgCtrlID
GetKeyState
DefWindowProcW
SetWindowsHookExW
CallNextHookEx
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
GetLastActivePopup
DestroyWindow
LoadIconW
DrawIcon
IsIconic
GetWindowRect
EnableWindow
SetCursor
LoadCursorW
UpdateWindow
DispatchMessageW
TranslateMessage
PeekMessageW
IsWindowEnabled
GetDlgItem
GetWindowLongW
GetParent
CreateDialogIndirectParamW
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
wsprintfW
CharUpperW
GetWindowPlacement
SystemParametersInfoW
OffsetRect
RegisterWindowMessageW
SetWindowPos
SetWindowLongW
GetWindow
SetForegroundWindow
GetForegroundWindow
gdi32
RectVisible
TextOutW
ExtTextOutW
Escape
PtVisible
GetBkColor
DPtoLP
LPtoDP
GetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetTextColor
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
comctl32
ord17
oledlg
OleUIBusyW
ole32
CoFreeUnusedLibraries
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleUninitialize
olepro32
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocString
SysStringLen
Sections
.text Size: 204KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ