Static task
static1
Behavioral task
behavioral1
Sample
4cc36f7a1add73115c44a595018a3f665f80e2aaab3fca29a5d1bfcf90574409.exe
Resource
win7-20240903-en
General
-
Target
4cc36f7a1add73115c44a595018a3f665f80e2aaab3fca29a5d1bfcf90574409.exe
-
Size
360KB
-
MD5
560301ed2bf83743ebd896d1e6869ce3
-
SHA1
338144c72ea8b360df3937ae0e8b5ac54053d461
-
SHA256
4cc36f7a1add73115c44a595018a3f665f80e2aaab3fca29a5d1bfcf90574409
-
SHA512
80d76f121ae856751e869c6bd365cab0803b10932ef1ead19149e0ec3ec6863df45d1af2d8c030a35044ce27e17c7c9c2d5172890b9c92f75cece520db0359ac
-
SSDEEP
6144:T9RXvdVdeqPUa51VU5qiHorWQABLsd4s/:T9R/j0qPUa5bQorWQABLbs/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4cc36f7a1add73115c44a595018a3f665f80e2aaab3fca29a5d1bfcf90574409.exe
Files
-
4cc36f7a1add73115c44a595018a3f665f80e2aaab3fca29a5d1bfcf90574409.exe.exe windows:4 windows x86 arch:x86
c9f7e018b269f1b5fe81cf757d6f8e93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
LoadLibraryA
GetProcAddress
WriteFile
GlobalReAlloc
GlobalSize
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalAlloc
VirtualAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleExA
GetModuleHandleA
GetStartupInfoA
user32
GetMenu
GetDlgItem
CharLowerA
DestroyWindow
ShowWindow
WinHelpA
DefFrameProcA
EnableMenuItem
GetParent
DefMDIChildProcA
EndDialog
CharUpperA
ReleaseDC
GetDC
SendMessageA
InvalidateRect
PostQuitMessage
SendDlgItemMessageA
wsprintfA
SetWindowPos
GetClientRect
SetScrollRange
SetScrollPos
LoadStringA
EndPaint
BeginPaint
DispatchMessageA
TranslateMessage
GetMessageA
CreateDialogParamA
UpdateWindow
CreateWindowExA
RegisterClassA
LoadCursorA
DialogBoxParamA
LoadIconA
gdi32
CreatePalette
DeleteObject
SelectObject
RealizePalette
SelectPalette
SaveDC
SetWindowOrgEx
RestoreDC
LineTo
MoveToEx
DPtoLP
Rectangle
SetROP2
SetViewportExtEx
SetWindowExtEx
SetMapMode
CreatePen
GetStockObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBitmap
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
_ftol
strncpy
strncmp
calloc
memset
strcpy
strlen
strcmp
memcpy
malloc
__set_app_type
_controlfp
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ