Static task
static1
Behavioral task
behavioral1
Sample
0a0fc437c6ffea9f71c2f0d0b1fbb07ff509a5f5c41d4129a65712dfe8eff952.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a0fc437c6ffea9f71c2f0d0b1fbb07ff509a5f5c41d4129a65712dfe8eff952.exe
Resource
win10v2004-20230915-en
General
-
Target
0a0fc437c6ffea9f71c2f0d0b1fbb07ff509a5f5c41d4129a65712dfe8eff952
-
Size
10.7MB
-
MD5
5fc20fa8a605b4c2a9db57435d7dd6f9
-
SHA1
4949fad0319e23c3d55a15131392ef8cf598e1d6
-
SHA256
0a0fc437c6ffea9f71c2f0d0b1fbb07ff509a5f5c41d4129a65712dfe8eff952
-
SHA512
db5e9bee8888793256556a3bb45b4d6aeb4e58b9ddf8355a82c9d327012c51ca456eb0c33880e21f29913e0ac2316353b9312de37779d5737ac441ed7212f75d
-
SSDEEP
196608:GgHtXeutw7qGuFjvw7fvCKmj9Zs+TR7SvXwknLbz8f785Q:3leswUFjvw7fvCKmj9Zs+TR7SvrnLnqX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a0fc437c6ffea9f71c2f0d0b1fbb07ff509a5f5c41d4129a65712dfe8eff952
Files
-
0a0fc437c6ffea9f71c2f0d0b1fbb07ff509a5f5c41d4129a65712dfe8eff952.exe windows:4 windows x86
2105ef12f12909f97e833064226f8e95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetFileAttributesA
GetFullPathNameA
GetSystemTime
FileTimeToSystemTime
GetTimeZoneInformation
GetProcAddress
LoadLibraryA
AreFileApisANSI
CloseHandle
GetLastError
WaitForSingleObject
GetExitCodeProcess
OpenProcess
FreeLibrary
GetStdHandle
GetConsoleMode
Sleep
VerSetConditionMask
IsWow64Process
FormatMessageA
GetProfileStringA
VerifyVersionInfoW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateDirectoryA
CreateFileA
DeleteFileA
RemoveDirectoryA
SetFileTime
FlushFileBuffers
GetFileSizeEx
GetFileTime
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
LocalAlloc
LocalFree
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetPrivateProfileIntA
GetEnvironmentVariableA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
CreateEventA
WaitForMultipleObjects
IsBadWritePtr
GetSystemTimeAsFileTime
FindClose
FindFirstFileA
FindNextFileA
ReleaseSemaphore
CreateSemaphoreA
OpenSemaphoreA
FlushInstructionCache
VirtualProtect
DeviceIoControl
LockFile
UnlockFile
IsBadStringPtrA
IsBadStringPtrW
GetDriveTypeA
WideCharToMultiByte
MultiByteToWideChar
MapViewOfFileEx
ReleaseMutex
CreateMutexA
SwitchToThread
GetProcessTimes
SetEnvironmentVariableA
ReadConsoleW
CreateFileW
WriteConsoleW
SetStdHandle
OutputDebugStringW
SetFilePointerEx
GetCurrentProcess
GetConsoleCP
HeapReAlloc
GetModuleFileNameW
GetOEMCP
IsValidCodePage
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
IsBadReadPtr
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemInfo
SetLastError
GetModuleHandleA
GetModuleFileNameA
VirtualQuery
SetPriorityClass
TlsFree
SetThreadPriority
GetCurrentThread
TerminateProcess
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentDirectoryA
SetConsoleCtrlHandler
OpenEventA
SetEvent
GetACP
SystemTimeToFileTime
GetTempPathA
GetLocalTime
GetDiskFreeSpaceA
GetUserDefaultUILanguage
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
GetTickCount
GetVersionExA
GetVersion
GetCurrentProcessId
GetPrivateProfileStringA
IsDebuggerPresent
LoadLibraryExW
GetCPInfo
GetModuleHandleExW
GetStartupInfoW
GetFileType
RtlUnwind
RaiseException
GetStringTypeW
DecodePointer
EncodePointer
user32
GetSystemMenu
AppendMenuA
LoadStringA
wsprintfA
DrawMenuBar
TranslateMessage
DispatchMessageA
GetSystemMetrics
MessageBoxA
CharLowerBuffA
CharUpperBuffA
CallMsgFilterA
PeekMessageA
shell32
ShellExecuteExA
advapi32
ReadEventLogA
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
RegFlushKey
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
GetUserNameA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
OpenEventLogA
CloseEventLog
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ws2_32
WSAStartup
freeaddrinfo
getaddrinfo
gethostname
WSACleanup
gethostbyname
sendto
recvfrom
inet_addr
bind
getpeername
WSAGetLastError
socket
shutdown
setsockopt
send
select
recv
getsockopt
ioctlsocket
connect
closesocket
accept
__WSAFDIsSet
gethostbyaddr
inet_ntoa
htons
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE