Static task
static1
Behavioral task
behavioral1
Sample
c450d139a4af396c900e7ee00ef3f3b1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c450d139a4af396c900e7ee00ef3f3b1.exe
Resource
win10v2004-20240226-en
General
-
Target
c450d139a4af396c900e7ee00ef3f3b1
-
Size
177KB
-
MD5
c450d139a4af396c900e7ee00ef3f3b1
-
SHA1
e2084460dd5e2b1af3f55852578c19ea79f41624
-
SHA256
221be1fc201fc91edcd91fb0fd0f60698158081926091993ac47a873559a4e33
-
SHA512
5d2fbd8db77a623597df678bd2ed96ca149d770c86e52439945bf3f4b5bc3f61f08553504558a1bdf27a11c1b88c9d580735d021a279df5a504f5bd07a5ec7f0
-
SSDEEP
1536:OPunRmSgJ4Mky+VCvhvjLw0QEMabb6PIXfTID:OGnRHWN1uCvpvdbZXfE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c450d139a4af396c900e7ee00ef3f3b1
Files
-
c450d139a4af396c900e7ee00ef3f3b1.exe windows:1 windows x86 arch:x86
cb8458513d5c0692b7d227aa345f8192
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
OpenThreadToken
RegCreateKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExA
InitializeSecurityDescriptor
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
OpenThreadToken
RegEnumValueW
RegCreateKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExW
OpenThreadToken
RegEnumKeyExW
OpenProcessToken
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegSetValueExA
OpenProcessToken
RegEnumValueW
OpenProcessToken
AllocateAndInitializeSid
user32
GetClientRect
GetMenu
LoadCursorW
SetFocus
LoadCursorW
CharNextW
GetWindowLongW
EnableWindow
wsprintfA
IsIconic
LoadStringA
PeekMessageW
GetKeyState
MapWindowPoints
GetMessageW
kernel32
EnterCriticalSection
GetModuleHandleW
VirtualFree
UnhandledExceptionFilter
GetCurrentProcessId
GetStartupInfoW
EnterCriticalSection
lstrcpyW
WaitForSingleObject
CreateFileW
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE