Static task
static1
Behavioral task
behavioral1
Sample
4ba506ffd4dcfc2893296d53f556ac68ed3180449a0bf6037d6522e0553344fb.exe
Resource
win7-20240215-en
General
-
Target
4ba506ffd4dcfc2893296d53f556ac68ed3180449a0bf6037d6522e0553344fb
-
Size
339KB
-
MD5
449a290c9f026bfbb8d6fdf999ef89d2
-
SHA1
d64276f96356441534de07b1ca062764611584e3
-
SHA256
4ba506ffd4dcfc2893296d53f556ac68ed3180449a0bf6037d6522e0553344fb
-
SHA512
afa5e0d0e05824152492ed00462f970ab53ebcebc6faa49a0f4836b2cc4b7d5948edfe662db867c66c1de47fadbaefddad42d539b591401525ab972909587e5f
-
SSDEEP
6144:b/qE9d70WIH9wFHf+MQYVA5TDT44zuQOIFlUMazNWHT7+U:uGIWiiHWnesT/483OciyL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4ba506ffd4dcfc2893296d53f556ac68ed3180449a0bf6037d6522e0553344fb
Files
-
4ba506ffd4dcfc2893296d53f556ac68ed3180449a0bf6037d6522e0553344fb.exe windows:5 windows x86 arch:x86
aac73941c87ad61412ca8ad4d2283df3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
DestroyMenu
advapi32
RegQueryValueExW
shell32
ShellExecuteW
ws2_32
gethostbyaddr
iphlpapi
GetAdaptersInfo
oleacc
LresultFromObject
gdi32
DeleteDC
winspool.drv
OpenPrinterW
oleaut32
VariantClear
Sections
.text Size: 295KB - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE