Static task
static1
Behavioral task
behavioral1
Sample
c4a1f44a5c576186736313a99a791b81.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4a1f44a5c576186736313a99a791b81.exe
Resource
win10v2004-20240226-en
General
-
Target
c4a1f44a5c576186736313a99a791b81
-
Size
53KB
-
MD5
c4a1f44a5c576186736313a99a791b81
-
SHA1
e6ec692203e1297fbd3ead2fc928672b81874849
-
SHA256
401aaa34f2559f9b809f20c3b30ee006210ee690b9961083993b02b41c934582
-
SHA512
1a8d02232cc9b0e190ea6610c47a5aa025ccd590a47cac40d0ad3f2966d357dcd4abc7f08a6c1d6dd2a4b8049720da3bf3c0499bd69c1f528ef1293d3b3daeb3
-
SSDEEP
1536:+SF6oQgY0aJe70mA7jOl0J7XFj0sPoWdAGl0:uCYi7NlM7JAr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4a1f44a5c576186736313a99a791b81
Files
-
c4a1f44a5c576186736313a99a791b81.exe windows:4 windows x86 arch:x86
2ee2839b5892262070da45ed00099c02
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ReadProcessMemory
GetThreadContext
CreateProcessA
TerminateProcess
VirtualAllocEx
GetProcAddress
GetModuleHandleA
VirtualProtectEx
ResumeThread
VirtualAlloc
SetFileAttributesA
GetModuleFileNameA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
GetLastError
ReadFile
ExitProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
HeapFree
CloseHandle
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
CreateFileA
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE