Static task
static1
Behavioral task
behavioral1
Sample
0158b34df588d1ed0d3380dc6a9b45f477b8d15c06343977da8ea2bc90e9cbea.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0158b34df588d1ed0d3380dc6a9b45f477b8d15c06343977da8ea2bc90e9cbea.exe
Resource
win10v2004-20230703-en
General
-
Target
0158b34df588d1ed0d3380dc6a9b45f477b8d15c06343977da8ea2bc90e9cbea
-
Size
247KB
-
MD5
433a9e36b90db28d5fb96f3c4cdd2297
-
SHA1
8b20e58e2b05ad38da68b9036a04f90b0749e58e
-
SHA256
0158b34df588d1ed0d3380dc6a9b45f477b8d15c06343977da8ea2bc90e9cbea
-
SHA512
ed9bd14695deaf1034c80ace1cc6140b18e196473a7b7f2d50be440fbe7d5c1e09aac29ce18fbbfb8ac8d2fae1c3ae75ed439d572022d58439d1bd994894aba7
-
SSDEEP
6144:S0z8s337nV0My5fMdlEHqmJyO0NKav0yQqfe8:SvsbnVhyaLEKoONKc0yQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0158b34df588d1ed0d3380dc6a9b45f477b8d15c06343977da8ea2bc90e9cbea
Files
-
0158b34df588d1ed0d3380dc6a9b45f477b8d15c06343977da8ea2bc90e9cbea.exe windows x86
87d239a4723aad714ef37ec160350014
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetCurrentDirectoryW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
_wcsnicmp
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcschr
wcslen
wcsrchr
wcstoul
shell32
ShellExecuteW
gdi32
BitBlt
CreateCompatibleDC
CreateFontIndirectW
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectW
GetStockObject
LineTo
MoveToEx
PatBlt
SelectObject
SetBkMode
SetTextColor
user32
AdjustWindowRect
BeginPaint
CallWindowProcW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
DrawTextW
EndPaint
FindWindowW
GetDlgCtrlID
GetFocus
GetForegroundWindow
GetMessageW
GetParent
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowDC
GetWindowLongW
GetWindowTextW
InflateRect
InvalidateRect
IsDialogMessageW
IsWindowEnabled
LoadBitmapW
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
OffsetRect
PostQuitMessage
RegisterClassExW
ReleaseDC
RemoveMenu
SendMessageW
SetFocus
SetForegroundWindow
SetWindowLongW
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 36KB - Virtual size: 36KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ