Static task
static1
Behavioral task
behavioral1
Sample
0b5c50692b91ec47ac2373850b7bb3ceb929400c97cd142afc964afdf587ac85.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
0b5c50692b91ec47ac2373850b7bb3ceb929400c97cd142afc964afdf587ac85.exe
Resource
win10v2004-20230703-en
General
-
Target
0b5c50692b91ec47ac2373850b7bb3ceb929400c97cd142afc964afdf587ac85
-
Size
2.2MB
-
MD5
8ff8e767c9d0778cbe30bea3781625da
-
SHA1
2555312e910f3ffe7a54272e95fb6a09885aa746
-
SHA256
0b5c50692b91ec47ac2373850b7bb3ceb929400c97cd142afc964afdf587ac85
-
SHA512
5252a5b16b7540b061e4d43c2098abefc0a4f326d36db09cad88d5eb095dc1f525f348a283bc2d10caf79c740cb4a314f31c0f59b9dd1bbaf7f2789b74ef327d
-
SSDEEP
49152:QQNzIB9AB0G0FpINcLU2xJunP6tUB6oZi0z0bHxhW5P2kF9E3m/vm:QQN0B9AYFpINcFonP62B6iiJmJp+W/vm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b5c50692b91ec47ac2373850b7bb3ceb929400c97cd142afc964afdf587ac85
Files
-
0b5c50692b91ec47ac2373850b7bb3ceb929400c97cd142afc964afdf587ac85.exe windows x86
a3b7d6f77decbb2618d6aa4b0932ff4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetCurrentProcess
FindClose
FindFirstFileA
CreateFileA
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
ExitThread
CreateThread
HeapAlloc
HeapReAlloc
HeapFree
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
WriteFile
CreateFileW
FindNextFileA
IsBadReadPtr
CreateDirectoryA
GetComputerNameA
ReadFile
GetThreadLocale
DeleteFileA
MoveFileA
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CreateEventA
SetEvent
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetVersionExA
FindResourceA
LoadResource
LockResource
SizeofResource
QueryDosDeviceA
OpenProcess
GetCurrentProcessId
GetLogicalDriveStringsA
WideCharToMultiByte
lstrlenA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetLastError
CompareStringA
CompareStringW
GetModuleFileNameA
CreateProcessA
GetThreadContext
GetLocalTime
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
GetModuleHandleA
GetProcAddress
GetProfileStringA
LoadLibraryA
FreeLibrary
WriteProcessMemory
SetThreadContext
ResumeThread
TerminateProcess
CloseHandle
WaitForSingleObject
VirtualFree
VirtualAlloc
WriteProfileStringA
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
ReleaseDC
GetDC
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
PostMessageA
LoadStringA
EnableWindow
MessageBoxA
SendMessageA
GetClientRect
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
GetWindow
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
EnableMenuItem
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateGuid
CLSIDFromString
oleaut32
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysFreeString
VariantTimeToSystemTime
SysAllocString
psapi
GetProcessImageFileNameA
ws2_32
ioctlsocket
select
getsockopt
connect
WSAGetLastError
WSACreateEvent
WSAWaitForMultipleEvents
WSASetLastError
WSAResetEvent
htonl
sendto
recvfrom
closesocket
bind
inet_addr
htons
socket
ntohl
WSACleanup
WSAStartup
ntohs
send
setsockopt
WSAEventSelect
WSACloseEvent
recv
WSAEnumNetworkEvents
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ