Static task
static1
Behavioral task
behavioral1
Sample
c4c71690ff4a51f824ed4aeeb9230d0a9d846d289fbc9b228578f776e80cba18.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c4c71690ff4a51f824ed4aeeb9230d0a9d846d289fbc9b228578f776e80cba18.exe
Resource
win10v2004-20240426-en
General
-
Target
c4c71690ff4a51f824ed4aeeb9230d0a9d846d289fbc9b228578f776e80cba18.exe
-
Size
716KB
-
MD5
2a02c81a9994f011090e174bb076ec9b
-
SHA1
50cf1a96d5e2945143b6fb3484b124d41349c77c
-
SHA256
c4c71690ff4a51f824ed4aeeb9230d0a9d846d289fbc9b228578f776e80cba18
-
SHA512
d6d44ee8d3cb1a39228e24f669e86ee871f0bef7b3348924b63e4b067b0ccf0f9f00333fa55d7f46b18dcd13fb4144e83e2611d118557639aa837861eb51342a
-
SSDEEP
12288:0k0wJoEANTCwX67nsbdxnZF2+9R32y1Cbd8n34rtzjg1S0lWEKm:0kVCGwX6LsbS+9Uy1CxCwtQkeKm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c4c71690ff4a51f824ed4aeeb9230d0a9d846d289fbc9b228578f776e80cba18.exe
Files
-
c4c71690ff4a51f824ed4aeeb9230d0a9d846d289fbc9b228578f776e80cba18.exe.exe windows:5 windows x86 arch:x86
e3978c5678b07cf6c3afd60b82fc9a82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GlobalAlloc
GetLastError
SetLastError
GetThreadContext
GetCommTimeouts
GetTickCount
CreateEventW
LoadLibraryA
LoadLibraryW
LoadLibraryExA
GetModuleFileNameA
GetSystemDirectoryW
GetTempPathW
CreateDirectoryW
CopyFileExA
GetVolumeInformationW
IsBadStringPtrW
BuildCommDCBW
SetComputerNameExA
VerifyVersionInfoA
DeleteVolumeMountPointW
GetLocaleInfoW
SetCalendarInfoW
GetNumberFormatW
WriteConsoleW
AddConsoleAliasW
GetStringTypeW
OutputDebugStringW
SetFileAttributesA
InterlockedExchange
EncodePointer
DecodePointer
IsProcessorFeaturePresent
RaiseException
RtlUnwind
GetCommandLineW
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
CloseHandle
ReadFile
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LCMapStringW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
user32
GetSysColorBrush
DdeFreeStringHandle
gdi32
GetCharWidthW
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 593KB - Virtual size: 40.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ