Static task
static1
Behavioral task
behavioral1
Sample
4501fc9cf955da8075f1d19b660b00e35825d2d4dee8de9dcd91d4efc6480f47.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4501fc9cf955da8075f1d19b660b00e35825d2d4dee8de9dcd91d4efc6480f47.exe
Resource
win10v2004-20240226-en
General
-
Target
4501fc9cf955da8075f1d19b660b00e35825d2d4dee8de9dcd91d4efc6480f47
-
Size
360KB
-
MD5
98d39f995941e5b4e3c1fbaade8d272f
-
SHA1
f4069a98beffb74e42504b8ca1828d70a7688e60
-
SHA256
4501fc9cf955da8075f1d19b660b00e35825d2d4dee8de9dcd91d4efc6480f47
-
SHA512
d925ed1640fad37ef2468d364945270a6919c357e2a44222730513a2eeca3da2f130c14d1d51ef758f07f7f871bedb6f73da6ef1241a66df4e04b0fa242a5f52
-
SSDEEP
6144:xLQ9CJBrpsvRI/kXgOgr96qtK9qmsQY/VRBpKJISSuzAXwPxzH5G08ceUTzRFDIO:xLo4BepNBQAhY/7KJIYMsx5G0aUTHIO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4501fc9cf955da8075f1d19b660b00e35825d2d4dee8de9dcd91d4efc6480f47
Files
-
4501fc9cf955da8075f1d19b660b00e35825d2d4dee8de9dcd91d4efc6480f47.exe windows:4 windows x86 arch:x86
ceec55d5e8ad77f0d9f8ab3a9e25e3c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
CloseHandle
ReadFile
GetCurrentThreadId
GetProcessHeap
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
FindResourceW
LoadResource
SizeofResource
InterlockedDecrement
GetModuleFileNameW
DeleteCriticalSection
RaiseException
LocalFree
LocalAlloc
FormatMessageW
GetACP
GetWindowsDirectoryA
HeapAlloc
DeleteFileA
_lclose
OpenFile
GetTempPathA
lstrcmpiA
GetTickCount
IsDBCSLeadByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetLastError
HeapFree
SetLastError
GetVersionExA
lstrcpynW
GetModuleHandleW
FindResourceA
CreateFileW
CreateFileA
WideCharToMultiByte
GetStartupInfoA
MultiByteToWideChar
lstrlenW
GetModuleHandleA
VirtualProtect
GlobalFree
GetCommandLineA
FreeLibrary
GlobalAlloc
user32
LoadStringA
LoadStringW
SendMessageA
CharNextW
CallWindowProcW
CallWindowProcA
UnhookWindowsHookEx
DestroyWindow
EnableMenuItem
CheckMenuItem
DestroyMenu
RemoveMenu
SendMessageW
GetParent
ReleaseDC
wsprintfW
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExA
RegQueryValueExW
RegCreateKeyExA
GetSecurityDescriptorControl
GetSecurityDescriptorLength
MakeSelfRelativeSD
BuildTrusteeWithObjectsAndSidW
SetEntriesInAclW
RegOpenKeyExW
RegSetValueExA
gdi32
SelectObject
DeleteObject
GetTextMetricsA
GetFontData
DeleteDC
CreateFontIndirectW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
msvcr71
memset
__p__commode
__setusermatherr
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_adjust_fdiv
_initterm
longjmp
bsearch
_controlfp
_onexit
__dllonexit
__set_app_type
_except_handler3
wcslen
wcscpy
_wcsicmp
realloc
free
_callnewh
_errno
__CxxFrameHandler
qsort
_CxxThrowException
malloc
memcpy
wcscmp
_vsnwprintf
_itoa
isalnum
__p__fmode
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ