Static task
static1
Behavioral task
behavioral1
Sample
c4d41538319225802ef4884db7c6c479.exe
Resource
win7-20240221-en
General
-
Target
c4d41538319225802ef4884db7c6c479
-
Size
408KB
-
MD5
c4d41538319225802ef4884db7c6c479
-
SHA1
8f3000817b52bd78f2af0d99120f7edc957af96e
-
SHA256
d80f8b24e1ecce96e37592e0b5ae63777909e0c6b0d1228ea2c92d71f862cb1c
-
SHA512
a0b0814dddd4dff6a23cf51969793390b541aa4c1c2d006ff950581b65ce1d49a0d52176ef5ddefff49ad79894d7ea146d6530f1bee7b48b91d16a7659a15f5c
-
SSDEEP
12288:MdmDFEyEoAb5c8G99VQ4OsXAkvvFvL4qGoAYhuy:nDFBrWGO4OsXAkvvFvL4qGoAYhu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4d41538319225802ef4884db7c6c479
Files
-
c4d41538319225802ef4884db7c6c479.exe windows:4 windows x86 arch:x86
2480719d1b1f9bffcf6884e165ed2be6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyboardLayoutList
GetDC
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
SystemParametersInfoA
GetKeyboardLayout
EnumDisplayMonitors
kernel32
GetShortPathNameA
GetStringTypeExW
GetSystemDefaultLCID
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OpenMutexA
OutputDebugStringA
QueryPerformanceCounter
GetProcessTimes
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
GetLocalTime
GetLastError
GetFileType
GetFileAttributesW
GetDiskFreeSpaceExW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateSemaphoreA
CreateMutexA
CreateFileW
CreateDirectoryW
CompareStringW
CloseHandle
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleHandleA
RaiseException
GetModuleFileNameW
InterlockedCompareExchange
advapi32
SetSecurityDescriptorDacl
AddAccessDeniedAce
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
UnregisterTraceGuids
TraceEvent
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
FreeSid
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessAllowedAce
ole32
CoTaskMemAlloc
CoTaskMemFree
shlwapi
SHDeleteKeyW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
rpcrt4
UuidCreate
shell32
SHGetSpecialFolderPathW
gdi32
DeleteObject
DeleteDC
CreateSolidBrush
CreateDCA
GetDeviceCaps
dbghelp
ImageRvaToVa
FindExecutableImage
GetTimestampForLoadedLibrary
ImageRvaToSection
FindExecutableImageEx
ImagehlpApiVersion
dsound
ord9
Sections
.text Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ