Static task
static1
Behavioral task
behavioral1
Sample
4ebb02befd1e1990a99597fffd13090e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ebb02befd1e1990a99597fffd13090e.exe
Resource
win10v2004-20231215-en
General
-
Target
4ebb02befd1e1990a99597fffd13090e
-
Size
1.7MB
-
MD5
4ebb02befd1e1990a99597fffd13090e
-
SHA1
b05ce93ee7b904f27f19fded51bfec5dea28e75e
-
SHA256
6009f78e31d4697d575b8b2d413b24749ef531a420a45efd87e092d93e087cb5
-
SHA512
2327b8bbfed21adeca449070cd976cd49bd1d764dece5ec8e6aef89467f0134df8fc3f5f3391cd2caafceffe4d4c99acf7a348631f0f2eeb0a8860850e206bc2
-
SSDEEP
49152:HkcFvGenwTkaQ6l5Px3iBMYaeBxucQTzqTb:1FvGe8Q6lVx3odaenuETb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ebb02befd1e1990a99597fffd13090e -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_1
Files
-
4ebb02befd1e1990a99597fffd13090e.exe windows:4 windows x86 arch:x86
34070d2f388106597eee704668840d03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
kernel32
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
FindNextFileA
DeleteFileA
FindFirstFileA
SetFileTime
LoadLibraryA
SetErrorMode
GetProcAddress
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetFileSize
GetFileAttributesA
FreeLibrary
SearchPathA
ExitProcess
CompareFileTime
lstrcpynA
GetWindowsDirectoryA
GetCurrentProcess
MultiByteToWideChar
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateProcessA
RemoveDirectoryA
CompareStringW
lstrlenW
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
WideCharToMultiByte
CompareStringA
ReadFile
SetFilePointer
FindClose
MulDiv
CreateThread
GlobalFree
GetCommandLineA
WritePrivateProfileStringA
CloseHandle
InitializeCriticalSection
LeaveCriticalSection
Sleep
EnterCriticalSection
GetPrivateProfileStringA
WriteFile
GetTempPathA
GetUserDefaultLangID
GetModuleFileNameA
GetTickCount
CopyFileA
user32
SetTimer
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
DestroyWindow
CreateDialogParamA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CharNextW
CharPrevW
ShowWindow
CharNextA
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
DispatchMessageA
ExitWindowsEx
PostQuitMessage
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SetWindowTextA
SetForegroundWindow
CreatePopupMenu
GetSystemMetrics
SendMessageA
InvalidateRect
PeekMessageA
gdi32
CreateBrushIndirect
CreateFontIndirectA
GetDeviceCaps
SetBkColor
SetBkMode
SetTextColor
CreateFontA
DeleteObject
SelectObject
advapi32
RegEnumValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
ole32
OleInitialize
OleUninitialize
CoCreateInstance
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ