Static task
static1
Behavioral task
behavioral1
Sample
4da9905262246925c4ee07cf63920ef5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4da9905262246925c4ee07cf63920ef5.exe
Resource
win10v2004-20231222-en
General
-
Target
4da9905262246925c4ee07cf63920ef5
-
Size
812KB
-
MD5
4da9905262246925c4ee07cf63920ef5
-
SHA1
7061c012783501033e790afce012f1c0016a22e0
-
SHA256
280114de2bd077b40ff4f3d971a6e98c7d82449ddcfb856366b1d1fbd52bc5d7
-
SHA512
6122a2fb20b5203f1cb6e403d814be8174ce9f74a12da3857cb06fa417d9e8af7ddba0671751a964e38024b28f3bf70b2c6d82c37bd5c4967fcc1679d386e34e
-
SSDEEP
24576:icNW+iyos8tCWUW1OxeCnLv2OoBLlMnWCzHsb:icM+iyqQe1Meuv/O5Mr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4da9905262246925c4ee07cf63920ef5
Files
-
4da9905262246925c4ee07cf63920ef5.exe windows:4 windows x86 arch:x86
c7788be102fdbfc367227f8056669299
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
GetFileTime
TryEnterCriticalSection
EnumCalendarInfoW
UTRegister
GetCPInfoExW
LoadLibraryExA
ScrollConsoleScreenBufferA
FindFirstVolumeW
SetConsoleLocalEUDC
user32
GetActiveWindow
LoadImageW
SendInput
GetCursorPos
SetWindowLongW
IMPGetIMEW
UnionRect
OpenWindowStationA
GetWindowDC
gdi32
GetTextExtentExPointW
GetCharABCWidthsFloatW
GdiGetBatchLimit
AngleArc
SetDeviceGammaRamp
OffsetWindowOrgEx
GdiGetLocalFont
GetPaletteEntries
BitBlt
GdiConvertBitmap
ExtEscape
CreateICA
ExtEscape
CreateRectRgn
Sections
.code Size: 12KB - Virtual size: 9.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 716KB - Virtual size: 713KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pack32 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE