Static task
static1
Behavioral task
behavioral1
Sample
0b6a45763e07cd35b10234cf21f03219280ced43d14349cad246f8400a9bc090.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0b6a45763e07cd35b10234cf21f03219280ced43d14349cad246f8400a9bc090.exe
Resource
win10v2004-20230703-en
General
-
Target
0b6a45763e07cd35b10234cf21f03219280ced43d14349cad246f8400a9bc090
-
Size
10.0MB
-
MD5
18af96813aff8b821c5837a1a738fd9a
-
SHA1
00c21883fd3bdd4b3254fc8a9ae9cc6225138f02
-
SHA256
0b6a45763e07cd35b10234cf21f03219280ced43d14349cad246f8400a9bc090
-
SHA512
8c7c4655d6b75c007b434fc9a9bbc323cda9f10ee74392009390c102e9fb4b410f40b56770bae786e338eba3471d01fadefbef9a453128eb11ccaa031910f83c
-
SSDEEP
196608:v4knOJhgbvjkTokTwXHjBhtsoUVxNuvXnR/JMLijZhqrZCjumQlja5mt7q7CNXjO:v409brkTokT4jZsoUVxNuvXnR/JMLijD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b6a45763e07cd35b10234cf21f03219280ced43d14349cad246f8400a9bc090
Files
-
0b6a45763e07cd35b10234cf21f03219280ced43d14349cad246f8400a9bc090.exe windows x86
2fd5a23586170b5660d973cc9a195326
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
SetSuspendState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
FindResourceW
GetDiskFreeSpaceExA
RemoveDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
lstrcmpiW
OutputDebugStringA
GetModuleFileNameA
GetTempPathA
CreateDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
CreateFileA
GetDiskFreeSpaceA
GetDriveTypeA
GetFileSize
SetFileAttributesW
SetFilePointer
DeviceIoControl
GetWindowsDirectoryA
GetModuleHandleA
GetShortPathNameA
QueryDosDeviceA
CopyFileA
MoveFileA
MoveFileW
MoveFileExA
MoveFileExW
GetVolumeInformationA
CreateEventA
SetEvent
CreateProcessA
GetSystemDirectoryA
GetVersionExA
GetNativeSystemInfo
GlobalLock
GlobalUnlock
IsDBCSLeadByte
GetSystemTimeAsFileTime
lstrlenA
GetFileAttributesW
QueryPerformanceCounter
WaitForSingleObjectEx
GetStdHandle
WriteFile
FreeConsole
SetConsoleTitleA
AllocConsole
GetModuleHandleW
SetConsoleMode
GetConsoleMode
LoadLibraryW
LoadLibraryA
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetTimeZoneInformation
VirtualQuery
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
HeapSize
GetTickCount
GetSystemInfo
CloseHandle
FindClose
DecodePointer
SizeofResource
LoadResource
Sleep
GetLastError
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenProcess
GetProcAddress
FreeLibrary
LockResource
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
GetDiskFreeSpaceW
GlobalMemoryStatus
GetModuleHandleExW
ExitProcess
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
LoadLibraryExW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileInformationByHandle
SetEndOfFile
ReadFile
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
HeapReAlloc
ExitThread
CreateThread
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
RaiseException
GetCommandLineA
HeapAlloc
EncodePointer
FileTimeToSystemTime
HeapFree
GetStringTypeW
LocalFree
FormatMessageA
FormatMessageW
SetConsoleCtrlHandler
GetProcessTimes
SetFileApisToOEM
GetConsoleScreenBufferInfo
AreFileApisANSI
SetProcessAffinityMask
MapViewOfFile
UnmapViewOfFile
OpenEventA
OpenFileMappingA
VirtualAlloc
VirtualFree
FileTimeToDosDateTime
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToLocalFileTime
SetLastError
SetFileTime
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
InitializeCriticalSection
GetLogicalDriveStringsA
GetLogicalDriveStringsW
user32
CharUpperW
CharLowerW
PostMessageW
ExitWindowsEx
wsprintfW
LoadStringA
MessageBoxW
CharUpperA
FindWindowW
CharNextA
SystemParametersInfoA
GetDesktopWindow
GetForegroundWindow
GetSystemMetrics
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
OpenClipboard
IsWindowVisible
SetWindowPos
PostMessageA
CloseDesktop
EnumDesktopWindows
OpenDesktopA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueW
GetFileSecurityW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyA
LookupPrivilegeValueA
RegQueryInfoKeyA
RegOpenKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
SetFileSecurityW
shell32
CommandLineToArgvW
ShellExecuteExW
ShellExecuteExA
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
SHGetPathFromIDListA
ShellExecuteA
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
VariantClear
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
VariantCopy
shlwapi
StrCpyNW
StrChrW
PathAppendW
PathRemoveFileSpecW
PathAppendA
StrCpyW
StrCmpW
StrCatW
StrRChrW
PathFileExistsW
PathFileExistsA
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 558KB - Virtual size: 557KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 799KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ