Static task
static1
Behavioral task
behavioral1
Sample
4e550c40c90af1304ead1bd832aec8a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e550c40c90af1304ead1bd832aec8a6.exe
Resource
win10v2004-20231215-en
General
-
Target
4e550c40c90af1304ead1bd832aec8a6
-
Size
373KB
-
MD5
4e550c40c90af1304ead1bd832aec8a6
-
SHA1
3f8d7dbc81048afdb72eeb8c6c1758fdd8127f7b
-
SHA256
b4b3ad0749d887bcfcbecde1535316752c457a4257cfdc08b3ddd1f608d2833b
-
SHA512
71f825f354edf19608a23a5e51bcfc98109664b514d08374ae57b7fdfecaa5e7a2fd0e33500cf2caf6bf8ac289d18a2838f2578f97c408dcc9ff5b2952c5f1dc
-
SSDEEP
6144:ZzfTyesyrD/uOEwsisEtCSgiTT35+IptChLSboo6SID7P1it9JySrFTGU:JZsyoVQN34Ia2X6SA7Ps9zwU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e550c40c90af1304ead1bd832aec8a6
Files
-
4e550c40c90af1304ead1bd832aec8a6.exe windows:4 windows x86 arch:x86
4c109d42c05163eb606344e3cfd41bad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
GetProcAddress
LoadLibraryA
GetCurrentThread
FreeLibrary
LoadLibraryW
VirtualQuery
GetModuleFileNameA
VirtualAlloc
PulseEvent
lstrcpyA
lstrlenA
VirtualFree
FreeResource
SizeofResource
LockResource
LoadResource
GetCurrentThreadId
GetLastError
VirtualProtect
GetSystemInfo
HeapCreate
DeleteFileA
ResumeThread
ReadFile
SuspendThread
CreateFileA
InterlockedDecrement
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
SystemTimeToFileTime
GetSystemTime
lstrcmpiA
Sleep
CreateEventA
GetModuleHandleA
CreateThread
WaitForSingleObject
CloseHandle
SetEvent
HeapFree
HeapReAlloc
HeapAlloc
DebugBreak
GetCommandLineA
ExitProcess
GetStartupInfoA
FindResourceExA
user32
GetDesktopWindow
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
BeginPaint
IsWindow
DialogBoxParamA
EndDialog
UnregisterClassA
PeekMessageA
TranslateMessage
PostMessageA
GetDC
FillRect
ReleaseDC
GetClientRect
RegisterClassA
BringWindowToTop
DefWindowProcA
AttachThreadInput
IsWindowVisible
IsRectEmpty
DestroyWindow
SetRect
DispatchMessageA
PostThreadMessageA
CharNextA
GetMessageA
gdi32
Rectangle
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
SetROP2
GetObjectA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantInit
VariantClear
atl
ord57
ord21
ord16
ord23
ord17
ord20
ord18
pdh
PdhGetCounterInfoA
PdhGetDataSourceTimeRangeW
PdhGetLogFileSize
PdhConnectMachineA
PdhCollectQueryData
wininet
InternetCloseHandle
InternetOpenW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 339KB - Virtual size: 735KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE