Static task
static1
Behavioral task
behavioral1
Sample
c43a1ce875e595a5456716e7774a5af9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c43a1ce875e595a5456716e7774a5af9.exe
Resource
win10v2004-20240226-en
General
-
Target
c43a1ce875e595a5456716e7774a5af9
-
Size
414KB
-
MD5
c43a1ce875e595a5456716e7774a5af9
-
SHA1
acddc4cab9526f0f8ef9c48839d4c4db7a5dbceb
-
SHA256
ebcf3fe4850181c69104ab71ddd4e74dd4efa508d163709a1355c3fff30a29c8
-
SHA512
48fb9252a67d7fc5446768f6a0bb63dff850d7fa4c3f851d7771b8703d2d68e0771f474152faaf25e2c751fee0350dd87668b58b0c71afaae7ad8d2ecee21945
-
SSDEEP
12288:aPsu71I0n+uSR//0Y+PcG8kUOSim+uRN/:aPsIM+PcHguRN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c43a1ce875e595a5456716e7774a5af9
Files
-
c43a1ce875e595a5456716e7774a5af9.exe windows:4 windows x86 arch:x86
6a4dd5f7563009456bd727fe0e9d2c3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ReleaseDC
DrawEdge
GetCursorInfo
EnumDisplaySettingsA
wsprintfA
LoadStringA
ShowWindow
GetKeyNameTextW
LoadBitmapA
MessageBoxExW
SetLastErrorEx
CreateDesktopW
GetClassNameA
DialogBoxParamA
SetDlgItemInt
LoadCursorW
GetScrollInfo
wininet
InternetWriteFile
FindFirstUrlCacheEntryExW
RetrieveUrlCacheEntryFileW
GetUrlCacheGroupAttributeA
IncrementUrlCacheHeaderData
GetUrlCacheConfigInfoW
InternetCheckConnectionA
InternetTimeFromSystemTimeA
shell32
SHQueryRecycleBinW
SHGetDataFromIDListA
SHFileOperationW
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetMalloc
SHEmptyRecycleBinW
SHGetSpecialFolderPathA
SHGetPathFromIDList
DragAcceptFiles
SHBrowseForFolderA
ExtractAssociatedIconW
FindExecutableA
SHGetDiskFreeSpaceA
DuplicateIcon
ShellExecuteExA
SHBrowseForFolderW
SHGetNewLinkInfo
ExtractIconExW
SHBrowseForFolder
SHFileOperation
comdlg32
FindTextA
GetSaveFileNameA
ReplaceTextA
ReplaceTextW
ChooseFontW
GetFileTitleW
FindTextW
GetSaveFileNameW
PageSetupDlgA
ChooseColorA
GetOpenFileNameW
PrintDlgA
ChooseFontA
ChooseColorW
GetFileTitleA
PrintDlgW
LoadAlterBitmap
GetOpenFileNameA
kernel32
GetModuleHandleA
GetFileType
GetCommandLineA
TlsFree
TlsGetValue
RtlUnwind
GetStringTypeA
EnumSystemLocalesA
SetConsoleCtrlHandler
GetCurrentThreadId
GetProcAddress
HeapCreate
DebugActiveProcess
GetTimeZoneInformation
GetAtomNameA
GetModuleHandleW
IsValidLocale
GetDateFormatA
GetCurrentProcess
InterlockedExchange
GetStartupInfoA
InitializeCriticalSectionAndSpinCount
GetDiskFreeSpaceExA
UnhandledExceptionFilter
CreateDirectoryExW
LCMapStringA
TlsAlloc
ExpandEnvironmentStringsW
VirtualFree
SetUnhandledExceptionFilter
CompareStringW
ExitProcess
HeapAlloc
OpenFileMappingW
FreeEnvironmentStringsA
HeapSize
GetCurrentProcessId
GetCPInfo
VirtualProtectEx
QueryPerformanceCounter
SetHandleCount
GetLastError
LCMapStringW
GetACP
GetStdHandle
LeaveCriticalSection
DeleteCriticalSection
IsValidCodePage
TerminateProcess
HeapDestroy
GetCurrentThread
GetTimeFormatA
Sleep
GetEnvironmentStringsW
GetOEMCP
VirtualQuery
WideCharToMultiByte
CompareStringA
GetLocaleInfoA
GetLocaleInfoW
InterlockedDecrement
GetUserDefaultLCID
HeapReAlloc
EnterCriticalSection
GetSystemDirectoryA
GetConsoleCP
TlsSetValue
WaitForMultipleObjects
WriteFile
GetSystemTimeAsFileTime
HeapFree
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTickCount
GetModuleFileNameA
GetStringTypeW
IsDebuggerPresent
DuplicateHandle
FreeLibrary
SetLastError
CreateEventW
InterlockedIncrement
GetVolumeInformationA
VirtualAlloc
FreeEnvironmentStringsW
GetEnvironmentStrings
LoadLibraryA
MultiByteToWideChar
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ