Static task
static1
Behavioral task
behavioral1
Sample
0e278f698cc712060e810d335664bf033480ff2588925e99ade1ac64e05f5fe3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0e278f698cc712060e810d335664bf033480ff2588925e99ade1ac64e05f5fe3.exe
Resource
win10v2004-20230831-en
General
-
Target
0e278f698cc712060e810d335664bf033480ff2588925e99ade1ac64e05f5fe3
-
Size
347KB
-
MD5
769fa861420da2af74dc0eac631e9188
-
SHA1
7378be59260b49304ddcb56b572caaf6f8b05179
-
SHA256
0e278f698cc712060e810d335664bf033480ff2588925e99ade1ac64e05f5fe3
-
SHA512
9182ad8451373f1ff9c4b640ecafd88ffdfda9b1f8698d96f7499076e25099213d30fbcc3c527581c16ee33d6681f29843e71fc9f7cd699b74bd417fdf75ac47
-
SSDEEP
6144:gz2Oiq2tVf151WTBj+O5LPHx81MReOeKNo1k/Xy5l49EKhzbp2X2Vjylyb:82Oiq2tVj1WThvR6Msocey0EKhvp2mhP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e278f698cc712060e810d335664bf033480ff2588925e99ade1ac64e05f5fe3
Files
-
0e278f698cc712060e810d335664bf033480ff2588925e99ade1ac64e05f5fe3.exe windows x86
53ce03a28162922a7d701b25947b2150
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90u
ord6566
ord4579
ord6569
ord6372
ord6183
ord6096
ord6101
ord5974
ord6040
ord5863
ord5850
ord6418
ord6174
ord3513
ord636
ord367
ord2097
ord1144
ord2597
ord5830
ord3231
ord933
ord6094
ord4541
ord4410
ord2469
ord525
ord6169
ord1325
ord3630
ord4405
ord4518
ord4490
ord5979
ord2479
ord2478
ord277
ord6164
ord1665
ord4652
ord3489
ord611
ord586
ord790
ord4044
ord4527
ord5387
ord5078
ord6311
ord333
ord4131
ord337
ord613
ord6065
ord4213
ord2087
ord3217
ord5674
ord5676
ord8452
ord4347
ord4996
ord5680
ord5663
ord6018
ord6060
ord4905
ord9272
ord750
ord6482
ord1156
ord1098
ord4211
ord1220
ord7332
ord7138
ord4043
ord4967
ord939
ord1553
ord3015
ord935
ord4322
ord2501
ord2490
ord665
ord406
ord1599
ord938
ord2537
ord2694
ord813
ord5939
ord5632
ord5324
ord2208
ord1810
ord1809
ord1675
ord3353
ord6408
ord1492
ord5653
ord4682
ord5167
ord2069
ord4631
ord5182
ord285
ord3220
ord1607
ord6187
ord6547
ord744
ord524
ord2904
ord6579
ord6259
ord2702
ord5851
ord280
ord286
ord811
ord4543
ord6808
ord6577
ord5008
ord4000
ord1938
ord1137
ord1108
ord766
ord595
ord3639
ord6572
ord6063
ord2758
ord1353
ord6091
ord6574
ord799
ord3537
ord3486
ord1063
ord1088
ord2263
ord6095
ord3622
ord1354
ord3543
ord2106
ord1183
ord3488
ord2592
ord6513
ord4351
ord5893
ord3856
ord757
ord553
ord2326
ord3589
ord6822
ord5778
ord265
ord1250
ord1248
ord6811
ord5767
ord1243
ord266
ord686
ord436
ord3515
ord4516
ord6666
ord2596
ord1357
ord2130
ord3577
ord2282
ord4512
ord1552
ord3187
ord663
ord403
ord6604
ord3627
ord1708
ord1779
ord12404
ord13194
ord9972
ord10457
ord10304
ord13136
ord12165
ord12617
ord7766
ord9965
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord4681
ord4910
ord4348
ord2891
ord4071
ord4081
ord4080
ord3286
ord2764
ord2893
ord2774
ord3140
ord2966
ord4728
ord3112
ord2983
ord2771
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2251
ord2206
ord6035
ord4179
ord2630
ord2612
ord2610
ord2628
ord1048
ord5548
ord2640
ord2617
ord3115
ord6741
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord1272
ord4664
ord1493
ord4345
ord1751
ord1754
ord6411
ord3355
ord600
ord296
ord639
ord374
ord3794
ord801
msvcr90
_CxxThrowException
__CxxFrameHandler3
wcsnlen
_ftelli64
_fseeki64
fopen
fread
ferror
fwrite
fclose
memset
__RTDynamicCast
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
memmove_s
free
malloc
memcpy_s
exit
wcsrchr
memcpy
kernel32
GetLastError
LoadLibraryW
CreateMutexW
FindResourceW
RemoveDirectoryW
SetFileAttributesW
CloseHandle
SetThreadPriority
CreateThread
DeleteFileW
CreateDirectoryW
GetFileAttributesW
GetPrivateProfileIntW
DosDateTimeToFileTime
FindResourceExW
SetFileTime
WriteFile
WideCharToMultiByte
CreateFileW
LocalFileTimeToFileTime
GetPrivateProfileStringW
GetModuleFileNameW
GetTickCount
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetProcAddress
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
lstrcmpiW
lstrlenW
GetModuleHandleW
SetLastError
GetCPInfo
MultiByteToWideChar
GetVersionExW
GetVersion
CreateProcessW
FindClose
FindFirstFileW
WinExec
ExitProcess
Sleep
GetSystemDefaultLangID
SizeofResource
LockResource
LoadResource
user32
DestroyIcon
DrawStateW
DrawFocusRect
OffsetRect
InflateRect
FrameRect
GetActiveWindow
WindowFromPoint
ClientToScreen
SetCursor
GetParent
GetNextDlgTabItem
IsMenu
GetWindowLongW
DestroyCursor
GetSysColorBrush
CreatePopupMenu
CreateMenu
GetMenuItemID
GetMenuState
ModifyMenuW
GetMenuItemCount
AppendMenuW
ReleaseDC
GetDC
GetDesktopWindow
SendMessageW
SystemParametersInfoW
TabbedTextOutW
DrawTextExW
GrayStringW
DrawTextW
GetMenuItemInfoW
SetRect
DrawEdge
FillRect
CopyRect
GetSysColor
SetWindowPos
KillTimer
GetCursorPos
GetSubMenu
LoadMenuW
IsWindowVisible
DrawIcon
IsIconic
SetTimer
GetClassInfoW
SetLayeredWindowAttributes
SetWindowLongW
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
DrawIconEx
UpdateWindow
InvalidateRect
GetWindowRect
FindWindowW
GetSystemMetrics
GetClientRect
GetClassLongW
SetClassLongW
LoadIconW
EnableWindow
gdi32
CreatePen
GetBkMode
CreateCompatibleBitmap
CreateCompatibleDC
Escape
ExtTextOutW
PtVisible
BitBlt
GetTextExtentPoint32W
Ellipse
CreateSolidBrush
DeleteDC
PatBlt
SetBkColor
GetDeviceCaps
DeleteObject
TextOutW
SelectObject
CreateFontIndirectW
GetStockObject
CreateDIBSection
RectVisible
GetObjectW
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
comctl32
InitCommonControlsEx
_TrackMouseEvent
urlmon
URLDownloadToFileW
wininet
DeleteUrlCacheEntryW
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ