Static task
static1
Behavioral task
behavioral1
Sample
0a101056992f1d4d70d2c4c5e1248e466f400eb45f60907a13df73dbeca3b60d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a101056992f1d4d70d2c4c5e1248e466f400eb45f60907a13df73dbeca3b60d.exe
Resource
win10v2004-20230915-en
General
-
Target
0a101056992f1d4d70d2c4c5e1248e466f400eb45f60907a13df73dbeca3b60d
-
Size
2.1MB
-
MD5
f8b114dc80b8f1469bbda4305bfa24ef
-
SHA1
e0f1b5c18abb68430c44f49b0cf851cb450fea19
-
SHA256
0a101056992f1d4d70d2c4c5e1248e466f400eb45f60907a13df73dbeca3b60d
-
SHA512
6f4e4a7ebf9d2ed40c55fdb7cde7173bb82cd27c960ca9d30aa98134ef0cf3adcb27550502714fc87f8a8bf4565ca2c0310bb6af14a1ebeca09597b77d19bd8e
-
SSDEEP
24576:HOxE8eOCX+I91Jiv4UTsP0UXP2L1KQx8q2c485ZDX8UoT:HoE8lIL0vnTc00P2bxQP85ZDw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a101056992f1d4d70d2c4c5e1248e466f400eb45f60907a13df73dbeca3b60d
Files
-
0a101056992f1d4d70d2c4c5e1248e466f400eb45f60907a13df73dbeca3b60d.exe windows:5 windows x64
4973f473da603027f88944757ea00c1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
GetErrorInfo
SysFreeString
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
user32
MessageBoxA
CharNextW
LoadStringW
SetWindowLongPtrW
CreateWindowExW
wsprintfW
UnregisterClassW
TranslateMessage
RegisterClassW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
GetSystemMetrics
GetMessageW
GetCursorPos
GetClassInfoW
GetAsyncKeyState
DispatchMessageW
DefWindowProcW
CharUpperW
CharLowerBuffW
CharLowerW
kernel32
Sleep
VirtualFree
VirtualAlloc
HeapFree
HeapAlloc
GetProcessHeap
lstrlenW
lstrcpynW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwindEx
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
lstrlenA
lstrlenW
lstrcpynA
lstrcpynW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
SwitchToThread
SuspendThread
SetThreadPriority
SetLastError
SetFilePointerEx
SetFilePointer
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
ReadFile
OutputDebugStringW
OpenProcess
LocalFree
LoadLibraryA
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalMemoryStatusEx
GetVersionExW
GetTickCount
GetThreadPriority
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileSize
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
GetCPInfoExW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
EnumSystemLocalesW
EnumCalendarInfoW
EnterCriticalSection
DeleteCriticalSection
CreateFileW
CreateEventW
CompareStringW
CloseHandle
Sleep
GetFileSizeEx
QueryFullProcessImageNameW
ole32
CoUninitialize
CoInitialize
msvcrt
isxdigit
isspace
ispunct
isprint
isgraph
iscntrl
isalpha
isalnum
strchr
strncmp
strcmp
memset
memmove
memcpy
memcmp
_wcslwr
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 573KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 37KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 432B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ