Static task
static1
Behavioral task
behavioral1
Sample
4e2ddf45310313dd1e3919b614e25cd0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e2ddf45310313dd1e3919b614e25cd0.exe
Resource
win10v2004-20231215-en
General
-
Target
4e2ddf45310313dd1e3919b614e25cd0.exe
-
Size
340KB
-
MD5
4e2ddf45310313dd1e3919b614e25cd0
-
SHA1
3f1f66c0877552b44e280b714de748f233787983
-
SHA256
657117e09e459a46a4bf8154f19e64ce493539133b9e834ce0ba67a4ebea9728
-
SHA512
3b5f6742a171730c1a547651161ec5ced6abe9623801b9bf5bcaa854466172eaa593563af6aa782ac99613666864c7bdf9daa71ad57f4dee69bc270cac56aa6c
-
SSDEEP
6144:stqdKF7Yta2UM5IxXF/tIKAL7iFE7sNBo+aa9R3HJxvkSuM4Pyd0Zbku:11tUM5aV/oLOVfhaa9ZpVMxku
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e2ddf45310313dd1e3919b614e25cd0.exe
Files
-
4e2ddf45310313dd1e3919b614e25cd0.exe.exe windows:4 windows x86 arch:x86
eca5dd1edaf790e25b7e8c87218bf1e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalLock
CreateFileA
GetModuleHandleA
CloseHandle
lstrlenA
GetDriveTypeA
LocalFree
CreateEventA
GetStdHandle
GetLastError
GetConsoleCP
GetACP
LoadLibraryExA
FindClose
IsBadReadPtr
FreeEnvironmentStringsA
DeleteTimerQueue
MapViewOfFile
HeapCreate
user32
CreateWindowExA
CheckMenuItem
GetMessageA
ClipCursor
DialogBoxParamA
EndDialog
GetDlgItem
SetFocus
GetSubMenu
IsMenu
RedrawWindow
GetDlgItemTextA
GetParent
DrawIconEx
apphelp
SdbCloseDatabase
ApphelpCheckIME
ApphelpCheckRunApp
ApphelpShowDialog
SdbFindFirstTag
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ