Static task
static1
Behavioral task
behavioral1
Sample
4f5441dc9541a909658cd4d2cf6b4f55548887c873b6aae5169fbb283b40172d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4f5441dc9541a909658cd4d2cf6b4f55548887c873b6aae5169fbb283b40172d.exe
Resource
win10v2004-20240802-en
General
-
Target
4f5441dc9541a909658cd4d2cf6b4f55548887c873b6aae5169fbb283b40172d
-
Size
123KB
-
MD5
717643b66aecd0a12a0ad06d5fb28371
-
SHA1
9253a4d343130cca4199f33f63ab9ca1dee056e8
-
SHA256
4f5441dc9541a909658cd4d2cf6b4f55548887c873b6aae5169fbb283b40172d
-
SHA512
97843427d1199a25dcd3028eaa43c863ad8c450a647ec34ceadc22aeef182cd74a06be2744f1bd25ad68d04dd9120b94667da2773c07ba095a5a35159cd15fd6
-
SSDEEP
3072:oRk+zfeGFUPTI7I+1zFK2my4cybWsAiTPR7P/K2Xj/skd6vknOivD4ba:oRzDjO2La
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f5441dc9541a909658cd4d2cf6b4f55548887c873b6aae5169fbb283b40172d
Files
-
4f5441dc9541a909658cd4d2cf6b4f55548887c873b6aae5169fbb283b40172d.exe windows:5 windows x86 arch:x86
de3fd9f66e93c56ac25ce728c8e1a322
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
user32
MessageBoxA
CharNextW
LoadStringW
MessageBoxW
LoadStringW
GetSystemMetrics
CharUpperW
kernel32
Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
SwitchToThread
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
SizeofResource
SetEvent
SetEnvironmentVariableW
ResetEvent
LockResource
LoadResource
IsValidLocale
GetVersionExW
GetThreadLocale
GetTempPathW
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetFileAttributesW
GetExitCodeProcess
GetDiskFreeSpaceW
GetCurrentProcessId
GetCommandLineW
GetCPInfo
FreeResource
FreeLibrary
FindResourceW
EnumCalendarInfoW
DeleteFileW
CreateProcessW
CreateFileW
CreateEventW
CompareStringW
CloseHandle
shfolder
SHGetFolderPathW
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 19KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ