Static task
static1
Behavioral task
behavioral1
Sample
4a748887cb210309e0c3f3a71ec30f9cea14f2fbc8202cb631583857ecbcefff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a748887cb210309e0c3f3a71ec30f9cea14f2fbc8202cb631583857ecbcefff.exe
Resource
win10v2004-20240226-en
General
-
Target
4a748887cb210309e0c3f3a71ec30f9cea14f2fbc8202cb631583857ecbcefff
-
Size
98KB
-
MD5
6917555708a0076f210633c91f36cee3
-
SHA1
7fa0275431468cfcd409c8eeb1b654d4ecb45b0b
-
SHA256
4a748887cb210309e0c3f3a71ec30f9cea14f2fbc8202cb631583857ecbcefff
-
SHA512
c9b09db477ed412d2af594cb9ac83ca30dba768611f7276d73c62010e4314cfbb77d8237d36e48f0fc08b12b10c289952e9f77fb11d60b1cd539fe32b7820a6d
-
SSDEEP
1536:IHrVBTGa0q4+8rvLuMKTvT1rfT1WVaIa24m/mmfAeN5+XKGgNsI:IHxBGq4+bMKHcE7m/9f3b+XKGgNP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a748887cb210309e0c3f3a71ec30f9cea14f2fbc8202cb631583857ecbcefff
Files
-
4a748887cb210309e0c3f3a71ec30f9cea14f2fbc8202cb631583857ecbcefff.exe windows:4 windows x86 arch:x86
0c3450150772d64c682aae33a9d9f442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
lstrcpyA
Sleep
CloseHandle
CreateSemaphoreA
WaitForSingleObject
lstrlenA
CreateThread
ReleaseSemaphore
HeapAlloc
ExitProcess
GetVersion
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
CreateFileA
FlushFileBuffers
SetStdHandle
WriteFile
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetEnvironmentVariableA
GetCommandLineA
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetLastError
HeapFree
HeapReAlloc
GetModuleFileNameA
GetLastError
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetStringTypeA
GetStringTypeW
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
ReadFile
SetFilePointer
MultiByteToWideChar
user32
MessageBoxA
LoadStringA
SetWindowPos
GetSystemMetrics
GetWindowRect
DefWindowProcA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
InvalidateRect
EndPaint
GetParent
KillTimer
IsDlgButtonChecked
CheckDlgButton
LoadIconA
SetFocus
GetKeyState
DialogBoxParamA
IsWindowEnabled
GetDlgItem
SendDlgItemMessageA
SetWindowTextA
SetForegroundWindow
SetTimer
EndDialog
SendMessageA
SetWindowLongA
SystemParametersInfoA
GetWindowTextA
GetWindowLongA
CallWindowProcA
IsWindowVisible
BeginPaint
DrawIcon
GetSysColor
gdi32
ExtTextOutA
SetBkColor
SetTextColor
Rectangle
CreateFontIndirectA
CreatePen
DeleteObject
SelectObject
CreateSolidBrush
comdlg32
GetSaveFileNameA
shell32
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
ord17
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ