Static task
static1
Behavioral task
behavioral1
Sample
4dc421807986e9ebc6a5b6ba2ad7acbd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4dc421807986e9ebc6a5b6ba2ad7acbd.exe
Resource
win10v2004-20231215-en
General
-
Target
4dc421807986e9ebc6a5b6ba2ad7acbd
-
Size
6KB
-
MD5
4dc421807986e9ebc6a5b6ba2ad7acbd
-
SHA1
d1453e3ce034b5724b45be64afe3514b2315f3b5
-
SHA256
d8ca2bdd08e706909b48e167dabf7cc955deb214e5689f1273619519be5f06ab
-
SHA512
dc989427df3224521f02b52927e277f1f2cedc5f286ce936ca1ed7a152b54d435291f1e0fcc34b201ce9649d80672890c1f132d8f5783174c642b617c80721c9
-
SSDEEP
96:+mR1PCXDLV+wsCxOotpGA4PWcYbwOzc48d8WdGRq/d:+mrqXMCJSYbwK09Uc/d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dc421807986e9ebc6a5b6ba2ad7acbd
Files
-
4dc421807986e9ebc6a5b6ba2ad7acbd.exe windows:1 windows x86 arch:x86
9324bfa6528d385918d230487699e9a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
FreeLibrary
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
CloseHandle
GetTickCount
GetVersionExA
LoadLibraryA
CopyFileA
LocalAlloc
OpenProcess
ReadFile
RtlUnwind
CreateFileA
Sleep
TerminateProcess
WinExec
lstrcpyA
user32
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
DefWindowProcA
advapi32
RegFlushKey
RegOpenKeyExA
RegSetValueExA
crtdll
__GetMainArgs
_splitpath
_stricmp
_stricmp
exit
raise
signal
strcat
strchr
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 24B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 588B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE