Static task
static1
Behavioral task
behavioral1
Sample
4e979075c596f6a4b5671cdb9428f98a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e979075c596f6a4b5671cdb9428f98a.exe
Resource
win10v2004-20231222-en
General
-
Target
4e979075c596f6a4b5671cdb9428f98a
-
Size
392KB
-
MD5
4e979075c596f6a4b5671cdb9428f98a
-
SHA1
73f288814cf4305d6eae75731dad88f55cd0210f
-
SHA256
4ac4c0cbff1c8431d62419d0a592088b8f4d16c774e0ea4e464cbc0669f5e57e
-
SHA512
895f8e9e78138b4f3aef839d20aad312626a24a37ce5dd5e9803739315fc1339f68ac2fb97a53d7ba973c94e1c90bc78fc91af93b6098a73326e030a9485d24d
-
SSDEEP
6144:bHVvW+FxAgek1C3EpduJFYRjTuaJfrv/0wEfYC9TbyrMiMDeEic2U9uKZEDrjL:bXFe6CFkZZVryf9RlDLiPUwKgrjL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e979075c596f6a4b5671cdb9428f98a
Files
-
4e979075c596f6a4b5671cdb9428f98a.exe windows:4 windows x86 arch:x86
e5bf348ccd2f0a464365fd5087baf3a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetLastError
CreateFileMappingA
LocalFree
GetConsoleCP
GetConsoleAliasA
CreateFileA
HeapCreate
GetACP
TlsGetValue
LocalUnlock
LoadLibraryExA
GetCalendarInfoA
FreeEnvironmentStringsA
FindAtomA
LocalLock
IsDebuggerPresent
WaitForSingleObject
CloseHandle
GetModuleHandleA
user32
DispatchMessageA
GetIconInfo
GetMessageA
DefWindowProcA
DrawTextA
CallWindowProcA
CascadeWindows
GetDC
DrawEdge
SetFocus
GetDlgItem
IsWindow
CreateDialogParamA
DrawIconEx
msasn1
ASN1BEREncFlush
ASN1BERDecBool
ASN1BEREncLength
ASN1BERDecCheck
ASN1BERDecEoid
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ