Static task
static1
Behavioral task
behavioral1
Sample
0e5ba8e1c4f013ba272b4aa20e5db89c8650ba26c5db5605101669240621bbff.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0e5ba8e1c4f013ba272b4aa20e5db89c8650ba26c5db5605101669240621bbff.exe
Resource
win10v2004-20230703-en
General
-
Target
0e5ba8e1c4f013ba272b4aa20e5db89c8650ba26c5db5605101669240621bbff
-
Size
489KB
-
MD5
c66f56df58339c8406a30894f4292a8a
-
SHA1
afcd199cde2b2fb7c65e0d8c7e6dbb6179bd3567
-
SHA256
0e5ba8e1c4f013ba272b4aa20e5db89c8650ba26c5db5605101669240621bbff
-
SHA512
1ea04eaa3a17e045aa373856c43583807a53bd377b2d9750c04e5fba18dfe6515abe401bc52b9368b55e546113148cfebba88898931164219a2c9de3bbd6f344
-
SSDEEP
12288:LqzZYBDNigsG0wqFVAozUiWwT2eIWxe888888888888W88888888888:ueBDNigs1wqFVAXiTT2x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e5ba8e1c4f013ba272b4aa20e5db89c8650ba26c5db5605101669240621bbff
Files
-
0e5ba8e1c4f013ba272b4aa20e5db89c8650ba26c5db5605101669240621bbff.exe windows x86
d44f56017e078abf87e787575db746f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
GetTokenInformation
user32
LoadStringW
MessageBoxA
CharNextW
CreateWindowExW
TranslateMessage
RegisterClassExW
PostQuitMessage
PostMessageW
OemToCharA
MessageBoxW
LoadStringW
LoadIconW
GetSystemMetrics
GetMessageW
DispatchMessageW
DestroyWindow
DefWindowProcW
CharUpperBuffW
CharNextW
CharLowerBuffW
kernel32
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
SetCurrentDirectoryW
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualFree
SystemTimeToTzSpecificLocalTime
SignalObjectAndWait
SetFileTime
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
ResetEvent
ReleaseMutex
ReadFile
MultiByteToWideChar
LockResource
LocalFileTimeToFileTime
LoadResource
LeaveCriticalSection
InitializeCriticalSection
GetVersionExW
GetTimeZoneInformation
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcess
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindResourceW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
EnumCalendarInfoW
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileW
DeleteCriticalSection
CreateThread
CreateMutexW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
Sleep
shell32
ShellExecuteExW
Shell_NotifyIconW
ole32
CoUninitialize
CoInitialize
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CoInitialize
shlwapi
PathCanonicalizeW
Sections
.text Size: 338KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 20KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ