Static task
static1
Behavioral task
behavioral1
Sample
450fd1d71f50fffb17c5ac6b3995bf436403c8926018e4774673e39d6c9e1dad.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
450fd1d71f50fffb17c5ac6b3995bf436403c8926018e4774673e39d6c9e1dad.exe
Resource
win10v2004-20240226-en
General
-
Target
450fd1d71f50fffb17c5ac6b3995bf436403c8926018e4774673e39d6c9e1dad
-
Size
459KB
-
MD5
b0c025044cde7ed7074ec4a0dd9f5edc
-
SHA1
1f6ce90204d63dbf5b129ddb23ba6b5812d3aa4c
-
SHA256
450fd1d71f50fffb17c5ac6b3995bf436403c8926018e4774673e39d6c9e1dad
-
SHA512
d12e2ba675508f0a59eb4f10178b542ff1607e42cdebdc2d2e20ebbd3ec3c53732e174f87b07ffe940c3a9fc1903cdfc5ac326c035d4e453a67eb0866bacf859
-
SSDEEP
6144:eVUv/CSLQbu0jUu5BwXRsAMJqkj37emhPcREXTIFQ7NS9rbtSQhKO7kzWl:0U/C1bdZXAlQEyXqkNS9rhzbkzWl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 450fd1d71f50fffb17c5ac6b3995bf436403c8926018e4774673e39d6c9e1dad
Files
-
450fd1d71f50fffb17c5ac6b3995bf436403c8926018e4774673e39d6c9e1dad.exe windows:4 windows x86 arch:x86
7b04ecdcc5019f6daaef5a5f35122b98
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetACP
VirtualAlloc
GetCurrentThread
GetOEMCP
GetStartupInfoA
ReleaseMutex
CreateFileMappingW
HeapFree
UnmapViewOfFile
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
SetEvent
WaitForSingleObject
TerminateThread
GetExitCodeThread
GetExitCodeProcess
CloseHandle
CreateProcessW
Sleep
GetVersionExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetProcessHeap
HeapAlloc
OpenFileMappingW
OpenEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetCommandLineW
GetSystemDirectoryW
LoadLibraryA
MapViewOfFile
lstrcpyW
GetLastError
LoadLibraryW
DeleteCriticalSection
LeaveCriticalSection
user32
LoadCursorA
LoadCursorW
GetWindowRect
LoadStringW
GetSysColorBrush
RegisterClassW
InvalidateRgn
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
UnregisterClassW
GetDesktopWindow
GetWindowLongW
EnableWindow
DialogBoxParamW
IsWindow
GetParent
GetDlgItem
EndDialog
LoadIconW
SendDlgItemMessageW
MessageBoxW
PostMessageW
SetWindowLongW
SystemParametersInfoW
GetDC
ReleaseDC
SendMessageW
EnumWindows
GetSystemMetrics
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameW
SetWindowPos
msvcrt
_controlfp
__dllonexit
_onexit
__p__fmode
__p__commode
fopen
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
wcstok
swprintf
srand
_wcsnicmp
wcsncat
wcslen
wcsncpy
fclose
fflush
_vsnprintf
fputs
vfprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_c_exit
exit
_wcsicmp
advapi32
RegOpenKeyA
Sections
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata51 Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg22 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata52 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ