Static task
static1
Behavioral task
behavioral1
Sample
4b15b51a5740fcbf3af622a0f9065f26d905e7d7cd22611b7661bfb0c4b0a162.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4b15b51a5740fcbf3af622a0f9065f26d905e7d7cd22611b7661bfb0c4b0a162.exe
Resource
win10v2004-20240412-en
General
-
Target
4b15b51a5740fcbf3af622a0f9065f26d905e7d7cd22611b7661bfb0c4b0a162
-
Size
144KB
-
MD5
bb75610158f731a2af11d89e1b9df606
-
SHA1
f80ad90c26da13f2fc545ef08f140da858956519
-
SHA256
4b15b51a5740fcbf3af622a0f9065f26d905e7d7cd22611b7661bfb0c4b0a162
-
SHA512
1efa06c30a6749d071ee0760dcc7654227d2d9256286b093978e58da22243fe9199639ee95366ec3bbdb3c3bd62bb68deca38da74ea41ba66d8b9308ba11d6f6
-
SSDEEP
3072:aHDDEFSOJIgmciPpbGiG+rLCUW6a1NbOU7PG2KNslQ5dri:I23mciC+KUWZOU7PANs6Lri
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b15b51a5740fcbf3af622a0f9065f26d905e7d7cd22611b7661bfb0c4b0a162
Files
-
4b15b51a5740fcbf3af622a0f9065f26d905e7d7cd22611b7661bfb0c4b0a162.exe windows:1 windows x86 arch:x86
55b731457773494bf3e8f2ea32e8b08c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
CharUpperA
LoadAcceleratorsA
LoadCursorA
LoadIconA
RegisterClassW
ws2_32
WSACleanup
WSAStartup
kernel32
CloseHandle
CreateEventA
CreateFileA
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentThreadId
GetEnvironmentStringsA
GetFileType
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetSystemDirectoryW
GetVersion
LoadLibraryA
MultiByteToWideChar
SetConsoleCtrlHandler
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
GetModuleHandleW
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0CLASS_DESCRIPTOR@@QAE@XZ
??0DSTRING@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0PATH@@QAE@XZ
??0PROGRAM@@IAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??1PROGRAM@@UAE@XZ
?Compare@OBJECT@@UBEJPBV1@@Z
?DisplayMessage@PROGRAM@@UBAEKW4MESSAGE_TYPE@@PADZZ
?DisplayMessage@PROGRAM@@UBEEKW4MESSAGE_TYPE@@@Z
?Fatal@PROGRAM@@UBAXKKPADZZ
?Fatal@PROGRAM@@UBEXXZ
?GetStandardError@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@CLASS_DESCRIPTOR@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Usage@PROGRAM@@UBEXXZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
AUTO Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 118KB - Virtual size: 375KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ