Static task
static1
Behavioral task
behavioral1
Sample
4e634475c4d01758925e3bffc6341050.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e634475c4d01758925e3bffc6341050.exe
Resource
win10v2004-20231222-en
General
-
Target
4e634475c4d01758925e3bffc6341050
-
Size
103KB
-
MD5
4e634475c4d01758925e3bffc6341050
-
SHA1
e6622ab89b0939c5be0aac5dac16e1e31ad322b1
-
SHA256
c9501efb166fc1e37634fde794cce830962905ae3bd4cd748f9881b251552380
-
SHA512
3cefe1e1ad648776ac93508066b731d34f9cd664d29a1aa03e5bd017c761905213a0fd05ed9a117daed9b344c08cbc1ac34d3a95a555e2183ca80a0503f9af43
-
SSDEEP
1536:1QuQ8/Hp6PGgksbrrJKXL+aXvQ9MbKwUWc8iiNwSWKyf2d2675cFUBWFBUdBdyYI:1QuWrwXLPYJPKscJGFUTdBdqXI2kot
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e634475c4d01758925e3bffc6341050
Files
-
4e634475c4d01758925e3bffc6341050.exe windows:4 windows x86 arch:x86
008eac86c1498ccf441b07b02c359c03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
InternetCrackUrlA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetSetOptionA
shlwapi
PathGetDriveNumberA
snmpapi
SnmpUtilOidCpy
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
strncpy
div
__CxxFrameHandler
strncat
_except_handler3
memmove
_exit
_strlwr
_strdup
wcslen
_CxxThrowException
??1type_info@@UAE@XZ
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_onexit
__dllonexit
_controlfp
strstr
__set_app_type
kernel32
GetEnvironmentVariableA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
LocalFree
WideCharToMultiByte
InterlockedDecrement
lstrlenA
MultiByteToWideChar
DeleteFileA
CreateProcessA
SetLastError
GetModuleFileNameA
GetLastError
GetVolumeInformationA
LoadLibraryA
FreeLibrary
SetFilePointer
ReadFile
GetTempPathA
GetTempFileNameA
WriteFile
DeviceIoControl
GetComputerNameA
GetVersion
CreateFileA
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
CloseHandle
GetTickCount
user32
CharToOemA
advapi32
GetUserNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
OleRun
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
VariantClear
SysFreeString
GetErrorInfo
SysAllocString
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xran@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
Sections
.text Size: 96KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ