Static task
static1
Behavioral task
behavioral1
Sample
43da422957b397e2805362661ab3fd4a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43da422957b397e2805362661ab3fd4a.exe
Resource
win10v2004-20240802-en
General
-
Target
43da422957b397e2805362661ab3fd4a.exe
-
Size
375KB
-
MD5
43da422957b397e2805362661ab3fd4a
-
SHA1
d9fcee0d2a68c509bd8fc8c30ee263de5c80b883
-
SHA256
e798106229f6985b40bd436abaf516360b7d19501f0f8c1ce89a3197ebb421a4
-
SHA512
164afbbb93a02fb334c57fea332255ca8f578ceece8c5ad22fa552cdc31cf45733abce2ebc0e8db224bf3d3d0b21a344358cc0379adf1d8afe4d2db8e0c7574f
-
SSDEEP
6144:6rkVntaABNOcmGaDOVufNOsGps4qCMasrHBtlFDhTD:+ya0NMfslplxUrHtFDF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43da422957b397e2805362661ab3fd4a.exe
Files
-
43da422957b397e2805362661ab3fd4a.exe.exe windows:5 windows x86 arch:x86
5c51ec4a6f442a6a3636ad4616307822
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesA
InterlockedIncrement
CreateJobObjectW
InterlockedCompareExchange
SetVolumeMountPointW
GetTimeFormatA
CreateHardLinkA
_lcreat
LocalFlags
SetFileTime
ClearCommBreak
SetFileShortNameW
LoadLibraryW
CopyFileW
_hread
GetCalendarInfoA
SetVolumeMountPointA
GetVersionExW
GetFileAttributesW
VerifyVersionInfoA
GetModuleFileNameW
CreateActCtxA
GetEnvironmentVariableA
RaiseException
LCMapStringA
InterlockedExchange
GetStdHandle
GetLogicalDriveStringsA
GetLastError
GetLocaleInfoA
CreateNamedPipeA
EnumSystemCodePagesW
SetComputerNameA
GlobalFree
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
GetNumberFormatW
CreateEventW
OpenEventA
QueryDosDeviceW
FoldStringA
SetEnvironmentVariableA
GlobalWire
GetCurrentDirectoryA
EnumDateFormatsW
GetShortPathNameW
SetProcessShutdownParameters
GetDiskFreeSpaceExW
ReadConsoleInputW
DebugBreak
GetTempPathA
SetFileAttributesW
CommConfigDialogW
TlsGetValue
SetFilePointer
EnumCalendarInfoA
GetProcAddress
GetComputerNameA
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
HeapSize
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
gdi32
GetBkMode
CreateDCW
GetCharWidth32A
GetCharWidthI
winhttp
WinHttpOpen
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ