Static task
static1
Behavioral task
behavioral1
Sample
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
Resource
win10v2004-20240508-en
General
-
Target
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153
-
Size
212KB
-
MD5
0aa5806bf88cabf74c31f03f3a443be9
-
SHA1
a22ac0bd29f4dd7e79dd5382c02075975340459b
-
SHA256
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153
-
SHA512
4dd711ef8281e7eb1279c881fd7c2a8c014743a93eeb96d7bca3fab3a33e9b740996d785cc06aa0f701a1844c3f91711a17f0be8404900bdb98872816fb05050
-
SSDEEP
3072:hGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:hG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153
Files
-
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe windows:4 windows x86 arch:x86
728b5168c443fc8cea3c0c483ddbb8ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
GetProcAddress
GetCurrentThread
WaitForMultipleObjects
GlobalAlloc
OpenMutexA
InitializeCriticalSection
AddAtomA
CompareStringA
CopyFileA
IsValidLocale
lstrcpynA
OpenEventW
GetModuleHandleA
GetStartupInfoA
GetSystemDefaultLCID
GetACP
GetCalendarInfoW
OpenWaitableTimerA
Sleep
GetSystemDefaultLangID
CreateSemaphoreW
ExpandEnvironmentStringsW
lstrlenA
GetDateFormatA
CreateMailslotW
SystemTimeToFileTime
BeginUpdateResourceA
GetExpandedNameW
SearchPathA
DosDateTimeToFileTime
GetWindowsDirectoryW
GetEnvironmentStringsW
GetStringTypeA
QueryPerformanceCounter
user32
GetDlgItemTextW
DialogBoxParamA
LoadMenuIndirectW
GetCapture
GetClassInfoW
IsIconic
LoadBitmapA
GetDC
PeekMessageW
GetMenuState
SetWindowTextW
GetWindowRect
UpdateWindow
GetForegroundWindow
DialogBoxIndirectParamA
ShowWindow
EnumClipboardFormats
AdjustWindowRect
SetCursorPos
ReleaseDC
InsertMenuA
CreateWindowExA
ActivateKeyboardLayout
LoadIconW
DrawTextA
DialogBoxIndirectParamW
gdi32
FillPath
UnrealizeObject
SetDIBits
CreateScalableFontResourceW
GetTextFaceA
CreateFontW
SelectClipRgn
AnimatePalette
advapi32
RegOpenKeyExA
RegOpenKeyW
RegDeleteKeyA
RegOpenKeyW
shlwapi
SHRegGetBoolUSValueW
PathIsUNCServerShareA
PathRemoveExtensionA
PathGetDriveNumberW
IntlStrEqWorkerA
PathMakePrettyA
StrCmpNIW
UrlCombineW
comctl32
DrawStatusText
CreateMappedBitmap
ImageList_Write
inetcomm
MimeOleGenerateCID
MimeOleSetBodyPropW
EssKeyExchPreferenceDecodeEx
CreateSMTPTransport
MimeOleSMimeCapInit
MimeOleSMimeCapGetHashAlg
MimeEditIsSafeToRun
MimeOleParseMhtmlUrl
EssSecurityLabelEncodeEx
MimeOleGetRelatedSection
MimeOleGetFileInfoW
EssReceiptRequestEncodeEx
MimeOleCreateSecurity
MimeOleFileTimeToInetDate
MimeOleSMimeCapGetEncAlg
MimeOleGetInternat
MimeOleSMimeCapAddCert
EssSignCertificateDecodeEx
oledlg
OleUIObjectPropertiesW
OleUIConvertW
OleUIPasteSpecialW
OleUIConvertA
OleUIPromptUserA
OleUIAddVerbMenuW
OleUIEditLinksA
OleUIPasteSpecialA
Sections
.qYS Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.jvNc Size: 2KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bCq Size: 3KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gMFODl Size: 3KB - Virtual size: 329KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 109KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ifpDc Size: 3KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Ox Size: 2KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ