Static task
static1
Behavioral task
behavioral1
Sample
c44a571ff772961ff851379fe8332c07.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c44a571ff772961ff851379fe8332c07.exe
Resource
win10v2004-20240226-en
General
-
Target
c44a571ff772961ff851379fe8332c07
-
Size
5KB
-
MD5
c44a571ff772961ff851379fe8332c07
-
SHA1
0d0a09a599b1606a9d66021b70e96c7bd2394ecd
-
SHA256
5ea8508cd19723e3fadc7ac250cc218fefca310efde961ef984a5d039014a380
-
SHA512
c9d5cf140f32806e59bdfaa49ce938a31c2ca6cce5b537715f59ef0c47d6ebeab77f6e571ae8aa0cbaa27a34cac35eda59868e2b2714f0317687204cc23f59f7
-
SSDEEP
96:SLH79ygyGQzkhy1ggRUemMPb+qHM6gQ4iXXapM:SLH7ggyLzD1rRWMz+qs6X4aXN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c44a571ff772961ff851379fe8332c07
Files
-
c44a571ff772961ff851379fe8332c07.exe windows:4 windows x86 arch:x86
b453ad1b7e7b7c5142a7681f12ea7d1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msto32
UninstallHook
InstallHook
user32
TranslateMessage
SendMessageA
RegisterClassExA
PostQuitMessage
KillTimer
GetWindowTextA
GetMessageA
GetForegroundWindow
GetClassNameA
FindWindowExA
FindWindowA
DispatchMessageA
DefWindowProcA
CreateWindowExA
wsprintfA
kernel32
GetStartupInfoA
ExitProcess
CreateProcessA
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
TerminateProcess
Sleep
RtlZeroMemory
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetProcAddress
GetModuleHandleA
wsock32
inet_ntoa
gethostbyname
WSAStartup
wininet
DeleteUrlCacheEntryA
InternetGetConnectedState
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE