Static task
static1
Behavioral task
behavioral1
Sample
4b777f01f62d29fa7d7827d7ba147d9978358fb248db9d5f9b5c88b1ec29e3c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b777f01f62d29fa7d7827d7ba147d9978358fb248db9d5f9b5c88b1ec29e3c1.exe
Resource
win10v2004-20231215-en
General
-
Target
4b777f01f62d29fa7d7827d7ba147d9978358fb248db9d5f9b5c88b1ec29e3c1
-
Size
162KB
-
MD5
f09a121a623d94884d0cb3c543595ea4
-
SHA1
839308f664dbdfdcc9ce281ba70571c061d97d8f
-
SHA256
4b777f01f62d29fa7d7827d7ba147d9978358fb248db9d5f9b5c88b1ec29e3c1
-
SHA512
2c70032f0c6d8d6f8cc21b2f63a089292b4e73a977dc7e631b88a31207b520205a419a109fa279ea1d49d67b5aa93252f8d3e404727439f670168ab82cca2f3b
-
SSDEEP
3072:87SGXNClHZfmU+geOOIQKVGAg0FujyyUSQT+E86rFH+:87dNs5OU+geOOISAOjrbkx8C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b777f01f62d29fa7d7827d7ba147d9978358fb248db9d5f9b5c88b1ec29e3c1
Files
-
4b777f01f62d29fa7d7827d7ba147d9978358fb248db9d5f9b5c88b1ec29e3c1.exe windows:5 windows x86 arch:x86
581ead5709e435f47513a6289f48f51f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetProcAddress
GetModuleHandleW
CloseHandle
MultiByteToWideChar
WaitForSingleObject
GetModuleFileNameW
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrcmpiW
Sleep
CreateThread
GetCurrentThreadId
SetEvent
FreeLibrary
LoadLibraryExW
GetCommandLineW
HeapFree
HeapAlloc
HeapDestroy
LeaveCriticalSection
WriteConsoleW
LoadLibraryW
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetCurrentProcessId
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedDecrement
lstrlenW
WideCharToMultiByte
CreateEventW
GetLastError
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
WriteFile
ExitProcess
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EnterCriticalSection
HeapCreate
IsProcessorFeaturePresent
GetFileType
GetStdHandle
SetHandleCount
GetCurrentProcess
TerminateProcess
HeapSize
GetProcessHeap
LocalFree
GetSystemTimeAsFileTime
RtlUnwind
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
user32
DispatchMessageW
TranslateMessage
MessageBoxW
GetMessageW
PostThreadMessageW
CharNextW
CharUpperW
advapi32
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryInfoKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegEnumKeyExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
StringFromGUID2
CoTaskMemFree
StringFromIID
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoAddRefServerProcess
CoReleaseServerProcess
CoInitializeEx
CoTaskMemAlloc
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
VariantClear
SysFreeString
SysAllocString
shlwapi
PathFileExistsW
UrlUnescapeW
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ