Static task
static1
Behavioral task
behavioral1
Sample
4fff9f41af1842e291b2383ba84bd5eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fff9f41af1842e291b2383ba84bd5eb.exe
Resource
win10v2004-20231222-en
General
-
Target
4fff9f41af1842e291b2383ba84bd5eb
-
Size
29KB
-
MD5
4fff9f41af1842e291b2383ba84bd5eb
-
SHA1
6bc3fe926457a0ba36eb2633e52ad98ddef79f9d
-
SHA256
2c4d3eb7902e07c3285767bc5e706b0b5588c5d451546da4d328e161fc93832a
-
SHA512
014e32eefa0ad342605e10d7b9d282f15d30f58488f7110d72c026ae76b07d8152440145862655212e6c9c7e022b28c8b84eebdf4c370384178ef99efb37e919
-
SSDEEP
768:MT+HFzFFEo0YAbjzmu1zYPeFQd46Ko8cnLc:MKlpFEjHjzmrPu6Ko8cY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4fff9f41af1842e291b2383ba84bd5eb
Files
-
4fff9f41af1842e291b2383ba84bd5eb.exe windows:4 windows x86 arch:x86
2b03e1f58400d0e3b87eeb8e0ecc57d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
InterlockedDecrement
GetProcAddress
GetModuleHandleA
CloseHandle
ReadProcessMemory
OpenProcess
Module32Next
DeleteFileA
TerminateProcess
SetFileAttributesA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
GetModuleFileNameA
ExitProcess
GetLastError
GetTempPathA
CreateThread
GetWindowsDirectoryA
WaitForSingleObject
CreateProcessA
WriteFile
CreateFileA
GetLocaleInfoA
GetVersionExA
LoadLibraryA
ExpandEnvironmentStringsA
GetCurrentProcess
ReleaseMutex
CreateMutexA
TerminateThread
GetFileAttributesA
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
WideCharToMultiByte
GetStartupInfoA
Sleep
lstrcmpiA
ExitThread
user32
GetWindowTextA
FindWindowExA
SendMessageA
IsWindow
VkKeyScanA
ShowWindow
SetFocus
SetForegroundWindow
keybd_event
BlockInput
SwitchToThisWindow
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMenu
FindWindowA
msvcrt
_CxxThrowException
wcslen
_controlfp
__set_app_type
strncpy
strlen
strcpy
memcpy
sprintf
memset
strcat
srand
__CxxFrameHandler
_EH_prolog
??2@YAPAXI@Z
strstr
strcmp
_except_handler3
rand
strchr
free
malloc
_vsnprintf
_snprintf
strtok
memcmp
atoi
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
??1type_info@@UAE@XZ
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE