e:\ople
Static task
static1
Behavioral task
behavioral1
Sample
4ee2d422f0b58ebc596caa7ecc70b390N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ee2d422f0b58ebc596caa7ecc70b390N.exe
Resource
win10v2004-20240709-en
General
-
Target
4ee2d422f0b58ebc596caa7ecc70b390N.exe
-
Size
346KB
-
MD5
4ee2d422f0b58ebc596caa7ecc70b390
-
SHA1
3dd806d99c700410b15cd986e6b62ff3c2e4a3d4
-
SHA256
3fd7231a488aed1de60aae19ad6d75e33e57dff3fb171998d6ac71cc81e99abf
-
SHA512
e3a0ab1361e67f4500fb95b604bacd44dc51c5bea8334597665fab68e59484e0e11a61876ba88692bd336154aeb1b5246e5b62bfe1b34a5a326a7a9903647288
-
SSDEEP
6144:VCblnlBGWHagAT6ho9YnOrhna+Y3585xJK3KOj+nHUE/KIoydi3EGc8M:cxlBB6dT6Q25sneKOj+n0E/9PSEvB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ee2d422f0b58ebc596caa7ecc70b390N.exe
Files
-
4ee2d422f0b58ebc596caa7ecc70b390N.exe.exe windows:4 windows x86 arch:x86
310e701d6a3e9833832c0f43ce95a82d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CompareStringW
GetLastError
InterlockedExchange
FreeEnvironmentStringsA
GetFileType
LeaveCriticalSection
GetUserDefaultLCID
GetOEMCP
GetModuleHandleA
MoveFileA
GetVersionExA
GetCurrentThread
InterlockedDecrement
GetEnvironmentStrings
WideCharToMultiByte
GetTimeZoneInformation
CreateMutexA
GetLocaleInfoA
CloseHandle
HeapDestroy
GetSystemTimeAsFileTime
TerminateProcess
InitializeCriticalSection
OpenMutexA
GetSystemInfo
GetCurrentProcess
GetModuleFileNameW
GetDateFormatA
LCMapStringA
MultiByteToWideChar
TlsGetValue
SetCurrentDirectoryW
LCMapStringW
GetLocaleInfoW
GetConsoleMode
GetCurrentProcessId
VirtualAlloc
GetStringTypeW
HeapSize
HeapCreate
IsValidLocale
GetCurrentThreadId
CompareStringA
SetHandleCount
GetACP
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetProcAddress
FreeEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
GetStdHandle
HeapFree
HeapAlloc
RtlUnwind
GetLogicalDrives
HeapReAlloc
SetLastError
EnumSystemLocalesA
VirtualQuery
GetCommandLineA
DeleteCriticalSection
TlsFree
WriteFile
EnterCriticalSection
TlsSetValue
SetFilePointer
IsBadWritePtr
TlsAlloc
UnhandledExceptionFilter
VirtualFree
GetStringTypeA
VirtualProtect
SetStdHandle
GetStartupInfoA
LoadLibraryA
ReadFile
GetModuleFileNameA
EnumSystemCodePagesA
ExitProcess
LocalFlags
GetTimeFormatA
SetEnvironmentVariableA
comctl32
InitCommonControlsEx
CreatePropertySheetPage
ImageList_Replace
ImageList_Merge
ImageList_SetImageCount
ImageList_Duplicate
GetEffectiveClientRect
CreateStatusWindowA
ImageList_Write
ImageList_GetImageInfo
ImageList_LoadImageA
shell32
SHGetSettings
ExtractAssociatedIconExA
InternalExtractIconListA
SHBrowseForFolder
gdi32
ResizePalette
ResetDCA
DeleteObject
ExtTextOutA
CreateDCA
EndPath
GetCharWidthW
SetColorSpace
StartDocW
Polyline
GetDeviceCaps
GetStockObject
GetRgnBox
CreateRoundRectRgn
GetEnhMetaFileA
GetObjectW
GetTextExtentPointA
GetMetaFileW
DeleteDC
GetCharWidthFloatA
user32
IsClipboardFormatAvailable
RegisterDeviceNotificationW
GetMenuItemRect
GetShellWindow
GrayStringW
EnumDisplayMonitors
GetMenuItemInfoW
SetMenuItemInfoA
MessageBoxW
CharNextA
GetPropW
ShowWindow
RegisterClassA
DestroyWindow
InflateRect
GetMessagePos
GetKeyboardLayoutNameW
SetWindowsHookA
GetClassNameW
CreateWindowExW
DefWindowProcW
ChangeClipboardChain
RegisterClassExA
GetMessageExtraInfo
EnumPropsW
EnumDisplaySettingsW
GetKBCodePage
MonitorFromRect
advapi32
LookupPrivilegeValueA
GetUserNameW
LogonUserW
RegOpenKeyA
RegReplaceKeyA
InitiateSystemShutdownW
LookupAccountSidA
RegSetKeySecurity
LookupPrivilegeDisplayNameA
CryptHashSessionKey
CryptSetProvParam
CryptGetUserKey
LookupPrivilegeDisplayNameW
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ