Static task
static1
Behavioral task
behavioral1
Sample
0b0b09694250b6364b3c83441a89b6d6922571428cfbf99d6ea9cedbaa5132a9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0b0b09694250b6364b3c83441a89b6d6922571428cfbf99d6ea9cedbaa5132a9.exe
Resource
win10v2004-20230915-en
General
-
Target
0b0b09694250b6364b3c83441a89b6d6922571428cfbf99d6ea9cedbaa5132a9
-
Size
9.9MB
-
MD5
be3a99d0085f2097b59f55cb03207c6d
-
SHA1
91f7cae27245ca4fbe346926085fe22f9ae338d1
-
SHA256
0b0b09694250b6364b3c83441a89b6d6922571428cfbf99d6ea9cedbaa5132a9
-
SHA512
1202ab65d3f60c91374e4bca0dffc962a141e839b1038940d527d3e801e075363b107b45917a30976c93abe3e0fb201c9d77b848e7ef317e41cd875baedb25d2
-
SSDEEP
196608:FtMwrptWxz/1wT3L1sucTCBO+DVcCiHjZtSCumOkKPOd/HybnU:FtbOw3psu+4DVcCY/nuVkCo/HybU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b0b09694250b6364b3c83441a89b6d6922571428cfbf99d6ea9cedbaa5132a9
Files
-
0b0b09694250b6364b3c83441a89b6d6922571428cfbf99d6ea9cedbaa5132a9.exe windows:5 windows x86
57e24e6126d487452696e8fb7492d178
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
WideCharToMultiByte
OpenProcess
CreateToolhelp32Snapshot
Process32First
GetModuleFileNameA
Sleep
LocalAlloc
CreateEventA
CreateThread
WaitForSingleObject
WriteFile
GetLastError
CloseHandle
GetCurrentProcess
GetProcAddress
SetFilePointer
SetStdHandle
Process32Next
CreateFileW
WriteConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LoadLibraryW
GetStringTypeW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetCommandLineA
HeapSetInformation
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetStdHandle
GetModuleFileNameW
GetStartupInfoW
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
DeleteService
QueryServiceStatus
ControlService
OpenServiceA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
CreateProcessAsUserA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
shlwapi
PathFileExistsA
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lcs0 Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.lcs1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lcs2 Size: 6.8MB - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE