Static task
static1
Behavioral task
behavioral1
Sample
c546942bd3863d228b2ced139867549c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c546942bd3863d228b2ced139867549c.exe
Resource
win10v2004-20240226-en
General
-
Target
c546942bd3863d228b2ced139867549c
-
Size
46KB
-
MD5
c546942bd3863d228b2ced139867549c
-
SHA1
f4a60ba1f4d4ae11b47daa0b1b7a0e5b8f98bb7c
-
SHA256
8135da4415d44b168103a1ae6ab425b127238f45d837f3da220438d796555dc0
-
SHA512
eb178876e62f9d51b124a7cf5621976c1d4e7cedaa3e166c69a194b862c00eb93233885ca1771b3c549a85d898fef454384571bbef2bcec8968c31a832dbd8d2
-
SSDEEP
768:lUsNae4fDa5xV2Plqm2CL4T0Rcjm7qY952s6YS4Dy4o5OnQiqHeBYH:SsNXcDQxVLCA0qm7qu52s6YtDXoEnC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c546942bd3863d228b2ced139867549c
Files
-
c546942bd3863d228b2ced139867549c.exe windows:5 windows x86 arch:x86
5f0f0d3c082c7c637bb0910706384a72
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OpenWindowStationA
GetMessageW
FindWindowExW
PeekMessageW
LoadCursorW
GetWindowLongW
GetWindowTextW
GetClassNameW
EndDialog
CharLowerBuffA
MsgWaitForMultipleObjects
GetIconInfo
CloseDesktop
ExitWindowsEx
DispatchMessageW
GetKeyState
GetCursorPos
GetKeyboardState
SetProcessWindowStation
GetDlgItemTextA
SetThreadDesktop
PeekMessageA
OpenDesktopA
GetWindowThreadProcessId
CloseWindowStation
DrawIcon
GetForegroundWindow
GetDlgItem
SendMessageW
GetMessageA
GetClipboardData
ToUnicode
GetDlgItemTextW
kernel32
SetEvent
CreateFileMappingW
CopyFileW
WriteFile
lstrlenW
GetModuleHandleA
SetEndOfFile
GetTickCount
GetTempPathW
CreateProcessW
WriteProcessMemory
LeaveCriticalSection
GetTimeZoneInformation
lstrcmpiA
GetVersionExW
GetComputerNameW
CloseHandle
GetFileSize
CreateThread
lstrcmpiW
InitializeCriticalSection
MapViewOfFile
GetModuleFileNameW
FindClose
GetDriveTypeW
SetFileAttributesW
GetCommandLineA
lstrcpyA
lstrcatA
GetExitCodeProcess
GetUserDefaultUILanguage
FindNextFileW
GlobalLock
WaitForSingleObject
lstrcatW
ResetEvent
FindFirstFileW
UnmapViewOfFile
MoveFileExW
lstrlenA
GetCurrentProcessId
HeapAlloc
GetSystemTimeAsFileTime
GetFileTime
GetProcessTimes
IsBadReadPtr
OpenProcess
ReadFile
CreateMutexW
DeleteFileW
GetLastError
FindResourceW
HeapFree
GetLocalTime
CreateFileW
SystemTimeToFileTime
GetCurrentThreadId
Sections
.jsfid Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kxuhch Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zsvah Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ