Static task
static1
Behavioral task
behavioral1
Sample
0e9eada795637b5a0b118018daf51c96cf3d79c708f9fe8a9264b4b9b1710820.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0e9eada795637b5a0b118018daf51c96cf3d79c708f9fe8a9264b4b9b1710820.exe
Resource
win10v2004-20230915-en
General
-
Target
0e9eada795637b5a0b118018daf51c96cf3d79c708f9fe8a9264b4b9b1710820
-
Size
14.8MB
-
MD5
064e9a3e0d393e9deb63322ae203afa6
-
SHA1
d81423413d1661e464dfc8706c14506812e5fa77
-
SHA256
0e9eada795637b5a0b118018daf51c96cf3d79c708f9fe8a9264b4b9b1710820
-
SHA512
f654d2cb064b2ed7b99448114f94d6beef5ec5d9523b78cdef4857016a2eaf7c8cd7c2dc5f995d7144d4601da1dee2597b06c87bdb1d1ad7e87ee6601a591936
-
SSDEEP
196608:4XPU+ltkNzEc1Q2vU0LfutXvlQKkTtyotVKb1RTMkwLODu/yetyYcJJZhYvFza2/:4iy0FOugpmcv/GDHL6JDw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e9eada795637b5a0b118018daf51c96cf3d79c708f9fe8a9264b4b9b1710820
Files
-
0e9eada795637b5a0b118018daf51c96cf3d79c708f9fe8a9264b4b9b1710820.exe windows:6 windows x86
d3ea94810a363a25ffae345108dbec61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoUninitialize
CoInitialize
IIDFromString
StringFromGUID2
CoCreateGuid
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
shell32
SHGetFolderPathW
SHGetFolderPathA
CommandLineToArgvW
user32
LoadStringA
MessageBoxA
SendMessageTimeoutW
CharNextA
MessageBoxW
GetMessageW
GetMessageA
DispatchMessageA
DispatchMessageW
MsgWaitForMultipleObjectsEx
TranslateMessage
PeekMessageA
IsWindowUnicode
wsprintfA
kernel32
GetFileInformationByHandle
GetDriveTypeW
DeleteFileW
CreateDirectoryW
WriteConsoleW
GetModuleFileNameW
GetStdHandle
GetConsoleMode
GetConsoleCP
GetFileType
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetModuleFileNameA
SizeofResource
GetCommandLineW
LoadLibraryExA
InitializeCriticalSectionAndSpinCount
FindResourceA
GetModuleHandleA
MultiByteToWideChar
GetLastError
SetDllDirectoryA
RaiseException
IsDBCSLeadByte
LoadResource
DecodePointer
GetProcAddress
DeleteCriticalSection
FreeLibrary
WideCharToMultiByte
lstrcmpiA
SetCurrentDirectoryA
DeleteFileA
GetTickCount
LocalFree
GetEnvironmentVariableA
GetModuleHandleExA
GetCurrentThreadId
Sleep
FormatMessageW
GetLocalTime
GetCurrentProcessId
FindFirstFileA
WriteFile
FileTimeToSystemTime
FindClose
WaitForSingleObject
LocalAlloc
CreateFileA
GetSystemDirectoryA
LockResource
CloseHandle
GetWindowsDirectoryA
ExitProcess
FormatMessageA
ReadFile
SetHandleInformation
CreatePipe
PeekNamedPipe
RemoveDirectoryA
CreateProcessA
CreateDirectoryA
GetExitCodeProcess
SetLastError
DeviceIoControl
FindNextFileA
CopyFileA
GetFileAttributesA
MoveFileExA
SetFileAttributesA
GetCurrentProcess
GetModuleHandleExW
GetTempPathA
GetNativeSystemInfo
GetSystemWow64DirectoryA
SetEndOfFile
SetFilePointerEx
OpenMutexA
LoadLibraryExW
LoadLibraryW
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
CreateFileW
TlsAlloc
LeaveCriticalSection
InitializeCriticalSection
TlsGetValue
GetFullPathNameW
SetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
ReadConsoleW
GetFileSizeEx
FlushFileBuffers
GetCurrentDirectoryW
GetTimeZoneInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SwitchToThread
GetStringTypeW
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
OutputDebugStringW
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetModuleHandleW
TerminateProcess
EnterCriticalSection
IsDebuggerPresent
advapi32
GetSecurityDescriptorDacl
RegDeleteValueA
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
CopySid
OpenProcessToken
GetTokenInformation
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
GetSecurityDescriptorOwner
SetFileSecurityA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
oleaut32
SysFreeString
VarUI4FromStr
GetErrorInfo
shlwapi
SHDeleteKeyA
PathIsURLA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
msi
ord117
ord115
ord159
ord141
ord44
ord204
ord91
ord67
ord8
ord158
ord137
ord160
ord168
ord31
ord189
Sections
.text Size: 443KB - Virtual size: 443KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109.7MB - Virtual size: 109.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ