Static task
static1
Behavioral task
behavioral1
Sample
c4a57a94dec86be9c5ad91b53fc5b11999df623b1bd19418edeac8df0b4a6e35.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4a57a94dec86be9c5ad91b53fc5b11999df623b1bd19418edeac8df0b4a6e35.exe
Resource
win10v2004-20240426-en
General
-
Target
c4a57a94dec86be9c5ad91b53fc5b11999df623b1bd19418edeac8df0b4a6e35
-
Size
3.3MB
-
MD5
893af24ba8a0dedf48230ed22c8e4816
-
SHA1
3b5129698c4d24acadbec76e60871efdbe8edac6
-
SHA256
c4a57a94dec86be9c5ad91b53fc5b11999df623b1bd19418edeac8df0b4a6e35
-
SHA512
99747220ac3a5f994db201373e8e50a6c8b49884db5b980a5c242a006fdca48b556a529177c009682e91e4b6a926bc43b4b188bd4965a9e1d34cf1fadde45108
-
SSDEEP
24576:kFDVkBBCvKGwoTV/KTXVe/2Ymf5cItNGlgJzHlzLWbZQexa0xfxeHt1EhmjIeUL9:wxkavKGwq2xtNGlWZexaixerK38oPd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4a57a94dec86be9c5ad91b53fc5b11999df623b1bd19418edeac8df0b4a6e35
Files
-
c4a57a94dec86be9c5ad91b53fc5b11999df623b1bd19418edeac8df0b4a6e35.exe windows:4 windows x86 arch:x86
820916bbbcee217a67a20524c88dc54d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetLastError
GetProcAddress
FindClose
DeleteFileA
CreateFileA
Sleep
GetNativeSystemInfo
GetModuleFileNameA
CloseHandle
GetCurrentProcess
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
FindNextFileA
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
advapi32
OpenProcessToken
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCreateKeyA
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ