Static task
static1
Behavioral task
behavioral1
Sample
4f51f4b032021c2e0681fe2b68a33461635dc6850d1889ddeb4909ad5fab3d37.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f51f4b032021c2e0681fe2b68a33461635dc6850d1889ddeb4909ad5fab3d37.exe
Resource
win10v2004-20240412-en
General
-
Target
4f51f4b032021c2e0681fe2b68a33461635dc6850d1889ddeb4909ad5fab3d37
-
Size
36KB
-
MD5
83802dc12833995ebc6a8ac14f921890
-
SHA1
e0362afb31ae0f2d657f86d5c1b84afe78332562
-
SHA256
4f51f4b032021c2e0681fe2b68a33461635dc6850d1889ddeb4909ad5fab3d37
-
SHA512
7f8b55928b825f26a856fc0b9ad86196f2e073641a6231a556bba9ae579209b4f1af854d122be4c4249000d54985bfe15f38ea273d79eb309d99cf25464a988d
-
SSDEEP
768:qfRygBbJj0dRwzgvysfjEe4VmGTNpt6ju5+Wq7:qZTBFoRpqEEpVTNymq7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f51f4b032021c2e0681fe2b68a33461635dc6850d1889ddeb4909ad5fab3d37
Files
-
4f51f4b032021c2e0681fe2b68a33461635dc6850d1889ddeb4909ad5fab3d37.exe windows:5 windows x86 arch:x86
0c04f28339acdd43cd6fb9855519e957
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkMode
SetBrushOrgEx
SetMapMode
SetMetaFileBitsEx
SetPixel
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocW
StartPage
StretchBlt
StretchDIBits
kernel32
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
PulseEvent
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
ExitProcess
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeConsole
GetACP
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFullPathNameW
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcessHeap
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GetVersionExW
HeapAlloc
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidCodePage
IsValidLocale
pdh
PdhValidatePathA
user32
CreateAcceleratorTableW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleW
DdeDisconnect
GetMessageA
LoadIconA
RegisterClassA
Sections
.text Size: 512B - Virtual size: 35B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ