Static task
static1
Behavioral task
behavioral1
Sample
4f12e9395ec078ddef27e0b55c1e8c2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f12e9395ec078ddef27e0b55c1e8c2a.exe
Resource
win10v2004-20231222-en
General
-
Target
4f12e9395ec078ddef27e0b55c1e8c2a
-
Size
22KB
-
MD5
4f12e9395ec078ddef27e0b55c1e8c2a
-
SHA1
4ececf38f7f88d592aa8428de80bd6c69c4ea1fa
-
SHA256
39a668fc231919bb348c95679450e00f7875e1c8de2d6f03a346d46a7692ebbb
-
SHA512
12b0456a6e8413b747193ae41fc9cd09dcad2560ff96be7f2282099d39507b429b030f4133cd7abcf32e1f255af978af10353afdce887073cec61ff831fa4661
-
SSDEEP
384:XJ0CCB8ug3lq+mC6VNwUKl1PHc02R+lBNDzlXW:XTCyug3lbmHVNwDU0JhW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f12e9395ec078ddef27e0b55c1e8c2a
Files
-
4f12e9395ec078ddef27e0b55c1e8c2a.exe windows:5 windows x86 arch:x86
69cd744b607d4e6eb9392e59ab2c050c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeClose
VirtualQuery
CancelIo
GetFileType
GetDriveTypeA
HeapFree
ExitThread
WriteFile
LocalSize
GetCurrentDirectoryW
CreateSemaphoreA
FindClose
GetModuleHandleA
HeapCreate
CreateDirectoryA
GetModuleFileNameA
GetFileAttributesA
FindVolumeClose
lstrlenA
CloseHandle
GetProcessHeap
GetCommandLineA
IsBadReadPtr
WaitForMultipleObjects
GetFileTime
uxtheme
GetThemeTextExtent
SetWindowTheme
IsThemeActive
GetThemeBool
CloseThemeData
GetThemeEnumValue
DrawThemeEdge
GetWindowTheme
CloseThemeData
DrawThemeBackground
GetThemeTextMetrics
GetThemeColor
OpenThemeData
fmifs
Extend
Extend
Extend
Extend
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE