Static task
static1
Behavioral task
behavioral1
Sample
a46cd6a7b40e34d40577c1e0b0d173e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a46cd6a7b40e34d40577c1e0b0d173e4.exe
Resource
win10v2004-20240221-en
General
-
Target
a46cd6a7b40e34d40577c1e0b0d173e4
-
Size
196KB
-
MD5
a46cd6a7b40e34d40577c1e0b0d173e4
-
SHA1
be0394249c2ded68be837dd65c4b8a0184f7aa68
-
SHA256
3dd7c774004ae61e5bb7303b2be797c43dfbb39d43c27d4257561b5f01782db3
-
SHA512
93c7d82d4dea602f145b6198c2c1fa55c5bb9ec2ebc8b86b3f5ebfb89d8ea34f866cf2113ecac833162dffe6db976f3c25712b3862a987b8b570c5093eec0af8
-
SSDEEP
3072:ymromSkSck90GHWhW/+1NHV/iG9om/GEUlGKUmUidR1W5FmVHF4lMknZ9PBAt:ghV0Zb1/rqSGvJUmpdR16cknZ9JG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a46cd6a7b40e34d40577c1e0b0d173e4
Files
-
a46cd6a7b40e34d40577c1e0b0d173e4.exe windows:4 windows x86 arch:x86
9a347643ab55c53ff929380720547ee8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetTickCount
lstrcatA
GetUserDefaultLangID
ExpandEnvironmentStringsA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetProcAddress
LoadLibraryA
SetFileAttributesA
GetFileAttributesA
lstrlenA
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WriteFile
RtlUnwind
GetCurrentProcess
GetCurrentDirectoryA
CloseHandle
VirtualFree
LCMapStringW
HeapCreate
HeapDestroy
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
user32
SetCursorPos
CopyImage
GetClassInfoW
GetSysColor
FlashWindowEx
wsprintfA
IsWindowEnabled
PostMessageA
GetDoubleClickTime
SetDoubleClickTime
IsWindow
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
FindExecutableA
shlwapi
PathGetCharTypeA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ