c:\etjbpaq\yaqqowe\asueee
Static task
static1
Behavioral task
behavioral1
Sample
c4833360f428a3f8d2f5f3e23a13c1df.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4833360f428a3f8d2f5f3e23a13c1df.exe
Resource
win10v2004-20240226-en
General
-
Target
c4833360f428a3f8d2f5f3e23a13c1df
-
Size
484KB
-
MD5
c4833360f428a3f8d2f5f3e23a13c1df
-
SHA1
bf74a76b2128bfa9f673232fc6300f3cfec87ff4
-
SHA256
dcdff27b5e6dff1d40bd040372929bd9c53024495670b47f6219f668c4bd3ed6
-
SHA512
b82407cdbba17c03d95163e546dd275823c5eac4642fb37bd6720cefd6b3da381c2c9a10aed9b9e2b66371069e982d48cfa2a2aee65fa8a3adbc048fe709ec72
-
SSDEEP
12288:aqZAMzuIFky9T2O2cKSw7+7AfdTI+nwS+jUXGG:aqZAMzuIFky9TRKS++7Ae+wStXGG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4833360f428a3f8d2f5f3e23a13c1df
Files
-
c4833360f428a3f8d2f5f3e23a13c1df.exe windows:4 windows x86 arch:x86
7ed75952e0516895506a68ea58197d12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameA
kernel32
GetCurrentThreadId
GetCurrentThread
GetLocaleInfoA
GetLocaleInfoW
WriteConsoleOutputCharacterA
LCMapStringW
GetStringTypeA
WriteConsoleOutputA
FreeEnvironmentStringsA
EnumSystemLocalesA
GetUserDefaultLCID
TlsAlloc
VirtualFree
GetTimeFormatA
SetStdHandle
GetCurrentProcessId
TerminateProcess
LoadLibraryExW
TlsGetValue
GetFileType
ExitProcess
CreateFileA
Sleep
HeapSize
VirtualQuery
GetLastError
FlushFileBuffers
WriteConsoleInputA
HeapValidate
GetProcAddress
SetEnvironmentVariableA
GetTickCount
OpenEventW
InitializeCriticalSection
HeapAlloc
CompareStringA
GetCompressedFileSizeA
GetCPInfo
LCMapStringA
FreeLibrary
CreateMutexA
FlushInstructionCache
GetStdHandle
WriteConsoleA
GetEnvironmentStringsW
SetLastError
SetFilePointer
InterlockedIncrement
WriteConsoleW
CreateNamedPipeA
FindResourceA
UnhandledExceptionFilter
GetTimeZoneInformation
HeapReAlloc
GetCommandLineA
TerminateThread
GetProcessHeap
EnterCriticalSection
SetUnhandledExceptionFilter
WritePrivateProfileStringA
ReadFile
HeapCreate
GetConsoleOutputCP
HeapDestroy
GetConsoleMode
GetEnvironmentStrings
QueryPerformanceCounter
GetCurrentProcess
EnumSystemLocalesW
SetHandleCount
InterlockedDecrement
VirtualAlloc
RtlUnwind
LeaveCriticalSection
GetModuleHandleA
InterlockedExchange
GetModuleFileNameA
SetConsoleMode
IsValidLocale
MultiByteToWideChar
CreateMailslotA
GetStartupInfoA
GetOEMCP
GetSystemTimeAsFileTime
GetStringTypeW
DeleteCriticalSection
GetVersionExA
LoadLibraryA
WriteFile
GetACP
AddAtomW
IsValidCodePage
TlsSetValue
GetDateFormatA
IsDebuggerPresent
HeapFree
GetStartupInfoW
OpenMutexA
FreeEnvironmentStringsW
CompareStringW
CloseHandle
SetConsoleCtrlHandler
GetConsoleCP
WideCharToMultiByte
ExpandEnvironmentStringsA
TlsFree
user32
RegisterClassA
RegisterClassExA
ChangeDisplaySettingsExA
MapVirtualKeyW
ReuseDDElParam
OemKeyScan
advapi32
GetUserNameW
CryptGenRandom
CryptEnumProviderTypesA
RegEnumKeyA
CryptVerifySignatureA
AbortSystemShutdownA
CryptReleaseContext
RegRestoreKeyA
DuplicateToken
RegSetKeySecurity
wininet
InternetCrackUrlA
DeleteUrlCacheEntryW
InternetFindNextFileW
InternetGetConnectedStateEx
FtpSetCurrentDirectoryA
InternetGetCookieA
InternetInitializeAutoProxyDll
ReadUrlCacheEntryStream
comctl32
InitCommonControlsEx
Sections
.text Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ