strlwr
Static task
static1
Behavioral task
behavioral1
Sample
4feb9edcc916071776fd26c4ed695a20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4feb9edcc916071776fd26c4ed695a20.exe
Resource
win10v2004-20231215-en
General
-
Target
4feb9edcc916071776fd26c4ed695a20
-
Size
46KB
-
MD5
4feb9edcc916071776fd26c4ed695a20
-
SHA1
21a6272e8d7d04609ba8ca41ea1ae1a801bd2850
-
SHA256
8aa303730120cc5edeaeb478cce18ad44b8bffac7d10da4a70bc69c9fa417fcb
-
SHA512
b61446e7ede9bd166d43bdd19562f088cc4b2434447778ed2d5d5fd63c9979d6fdd4e3498409cf5675c4e5347da01fa809cbcb36f72ed1c1447a6117ed68eeee
-
SSDEEP
768:zB4rfvIkvXC91Q8ik3FHZah13sh7IfshZ27VqUGyed6/AjtF1WTpr:zqlAeh13shKsSkNd6/AjtF16N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4feb9edcc916071776fd26c4ed695a20
Files
-
4feb9edcc916071776fd26c4ed695a20.exe windows:4 windows x86 arch:x86
ed591afd004a36e163de0e8f4f7a525f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord2931
ord5224
ord3948
ord5230
ord5213
ord605
ord764
ord1964
ord1482
ord2322
ord3997
ord5563
ord4081
ord2272
ord5491
ord3850
ord1916
ord911
ord784
ord781
ord578
ord304
ord297
ord310
ord5403
ord2468
ord2131
ord1554
ord3195
ord1794
ord3641
ord4749
ord5182
ord5912
ord1401
ord4262
ord5203
ord4212
ord4890
ord4580
ord2168
ord2020
ord1671
ord1670
ord1551
ord354
ord3182
ord1084
ord1934
ord3210
ord326
ord1063
ord2991
ord5915
ord1620
ord1920
ord4486
ord3946
ord1402
ord4244
ord5152
ord1908
ord1903
ord5073
ord6275
ord4185
ord5214
ord3403
ord4320
ord4722
ord4282
ord1600
ord5960
ord923
ord928
ord932
ord930
ord934
ord2410
ord2394
ord2413
ord2408
ord2385
ord2387
ord2405
ord2178
ord2862
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord3761
ord6067
ord1362
ord5175
ord1656
ord1655
ord1599
ord5200
ord572
ord4083
ord865
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord1207
ord3333
ord566
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4541
ord3830
ord2248
ord5566
ord4568
ord5226
ord4014
ord757
ord3683
ord4038
ord620
ord265
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord1617
msvcr71
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
?terminate@@YAXXZ
_controlfp
_amsg_exit
_acmdln
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
__CxxFrameHandler
_except_handler3
strrchr
isupper
_errno
perror
memcmp
_iob
fprintf
memcpy
_purecall
strcmp
vsprintf
exit
strcat
fclose
fseek
fwrite
fread
memset
fopen
atoi
div
strcpy
strstr
strlen
_strrev
free
malloc
_setmbcp
_write
_read
_open
_close
_unlink
_stat
_CxxThrowException
kernel32
GetVersionExA
CreateFileA
MoveFileExA
WaitForSingleObject
GetCommandLineA
CreateProcessA
CreateDirectoryA
GetLongPathNameA
RemoveDirectoryA
MoveFileA
GetModuleFileNameA
CloseHandle
GetTempPathA
DeleteFileA
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
EnableWindow
LoadIconA
shell32
ShellExecuteA
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ