Start
Static task
static1
Behavioral task
behavioral1
Sample
d443608749f4f61a08f6c8351016c486.exe
Resource
win7-20240220-en
General
-
Target
d443608749f4f61a08f6c8351016c486.exe
-
Size
6.8MB
-
MD5
d443608749f4f61a08f6c8351016c486
-
SHA1
7a9a3b73a0b67ac584f3363fc68403150cc6bb25
-
SHA256
5dffcf0920f79b3ddb9623167db653dba6f51e0257f68fb32b4626ea95f4f2ca
-
SHA512
b0f77ca77c170134b66b4991de458822927c0aea3e8543113ae11a7897cf215b43f90d62cf339a84db8028c41d51a36c358c2aca2d92aa39d418446e04721879
-
SSDEEP
196608:gEG+hWQPPYfkxV3gKaJVXcurDaUH3dTcMGV7E:gEGKWDkx1gKa8uvDHR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d443608749f4f61a08f6c8351016c486.exe
Files
-
d443608749f4f61a08f6c8351016c486.exe.exe windows:6 windows x86 arch:x86
ba4ce0cbe832b3560bbc7a0c6d1fe182
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
wsprintfA
GetProcessWindowStation
GetUserObjectInformationW
gdi32
CreateCompatibleBitmap
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CoInitialize
ws2_32
WSAStartup
crypt32
CryptUnprotectData
shlwapi
PathFindExtensionA
gdiplus
GdipGetImageEncoders
setupapi
SetupDiEnumDeviceInfo
ntdll
RtlUnicodeStringToAnsiString
rstrtmgr
RmStartSession
Exports
Exports
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp(‹ Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp(‹ Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp¯#@ Size: - Virtual size: 998KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp¯#@ Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp¯#@ Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 798KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ