Static task
static1
Behavioral task
behavioral1
Sample
cd4d133c0f3a4b6682ddaf174f624755.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd4d133c0f3a4b6682ddaf174f624755.exe
Resource
win10v2004-20240226-en
General
-
Target
cd4d133c0f3a4b6682ddaf174f624755
-
Size
243KB
-
MD5
cd4d133c0f3a4b6682ddaf174f624755
-
SHA1
fdab930a94cac6f02919069de9ef8398d1b40df8
-
SHA256
3a2ac5dd0208cf812f0e66fc8293408ded244ef1aeb259d187a415af6665c0c7
-
SHA512
3dd9b14b838e7b92b3f3db6e63d4e67b15240cffbc4d34eeb73b3da2573f3924e215a81b7f0def768888411bec5f7020e3288cd98371b44ca9386de18f079e0b
-
SSDEEP
3072:8dRsIkKwpDw8o/pH3Jc20b16TLsduZZClAcE5x55wTn3C3P/lpmwVZ7V0NUYfxtm:FIj8kbx660uOQf5wTq//VKZtXFD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd4d133c0f3a4b6682ddaf174f624755
Files
-
cd4d133c0f3a4b6682ddaf174f624755.exe windows:4 windows x86 arch:x86
12278c756ba66da07f5fbd079954fd80
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
GetClipRgn
GetDCPenColor
GetFontLanguageInfo
GetGraphicsMode
GetNearestPaletteIndex
GetObjectType
GetPixelFormat
GetRandomRgn
GetStretchBltMode
GetTextCharacterExtra
SetPixel
SetTextCharacterExtra
SetTextColor
kernel32
DeleteCriticalSection
EnterCriticalSection
FindClose
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileTime
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GlobalAlloc
GlobalFlags
GlobalHandle
GlobalSize
InitializeCriticalSection
IsDebuggerPresent
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MoveFileA
QueryPerformanceCounter
SetFilePointer
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WriteFile
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_iob
_itoa
_lock
_onexit
_stat
_strlwr
_unlock
_vsnprintf
abort
atoi
calloc
exit
fclose
fflush
fopen
fprintf
free
fwrite
malloc
memcmp
memmove
memset
memcpy
rand
realloc
signal
sprintf
srand
strcat
strcmp
strcpy
strlen
strncmp
strstr
time
vfprintf
user32
BeginPaint
CallWindowProcA
CheckDlgButton
DrawTextA
EndDialog
EndPaint
GetCursor
GetForegroundWindow
GetInputState
GetMenuContextHelpId
GetPropA
GetQueueStatus
GetScrollPos
GetWindowContextHelpId
GetWindowDC
GetWindowLongA
IsWindowEnabled
IsWindowUnicode
RemovePropA
SendMessageA
SetDlgItemTextA
ShowWindow
WindowFromDC
Sections
.text Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 266KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE