Static task
static1
Behavioral task
behavioral1
Sample
0edae1cca68b638062429b2a9fa2c662bae5f28df60c5783ccdeca15f2e9483d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0edae1cca68b638062429b2a9fa2c662bae5f28df60c5783ccdeca15f2e9483d.exe
Resource
win10v2004-20230915-en
General
-
Target
0edae1cca68b638062429b2a9fa2c662bae5f28df60c5783ccdeca15f2e9483d
-
Size
2.1MB
-
MD5
9c478b198435fb8a33c743251451e953
-
SHA1
631de3368e41359bd96367fe0bac18e5b17c8e11
-
SHA256
0edae1cca68b638062429b2a9fa2c662bae5f28df60c5783ccdeca15f2e9483d
-
SHA512
84e88a60a7651e763a3e21afdbe5e99f4142fc4839dd018b053d360db04246676326d61e56bfcbc8ee708cc6fb8e3d6eb25eece486b3b9ee2d26c24e9500700b
-
SSDEEP
49152:24V6L4rgWFzF9ibK/c381+IL1xyqZ6/1MaKYxkxsAAMQx9i:2I6UUWFzF9ibK/c38D7yqZ6/1MDY+PAG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0edae1cca68b638062429b2a9fa2c662bae5f28df60c5783ccdeca15f2e9483d
Files
-
0edae1cca68b638062429b2a9fa2c662bae5f28df60c5783ccdeca15f2e9483d.exe windows:4 windows x86
00e657d617e4209dd4d818d9bb75a42c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AllocateAndInitializeSid
CopySid
EqualSid
GetLengthSid
GetUserNameA
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
comdlg32
ChooseColorA
ChooseFontA
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
gdi32
BitBlt
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontA
CreateFontIndirectA
CreatePalette
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
EndDoc
EndPage
ExcludeClipRect
ExtTextOutA
ExtTextOutW
GetBkMode
GetCharABCWidthsFloatA
GetCharWidth32A
GetCharWidth32W
GetCharWidthA
GetCharWidthW
GetCharacterPlacementW
GetDIBits
GetDeviceCaps
GetObjectA
GetOutlineTextMetricsA
GetPixel
GetStockObject
GetTextExtentExPointA
GetTextExtentPoint32A
GetTextMetricsA
IntersectClipRect
LineTo
MoveToEx
PatBlt
Polyline
RealizePalette
Rectangle
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetDIBits
SetMapMode
SetPaletteEntries
SetPixel
SetPixelV
SetTextAlign
SetTextColor
StartDocA
StartPage
StretchBlt
TextOutA
TranslateCharsetInfo
UnrealizeObject
UpdateColors
imm32
ImmGetCompositionStringW
ImmGetContext
ImmReleaseContext
ImmSetCompositionFontA
ImmSetCompositionWindow
kernel32
Beep
ClearCommBreak
CloseHandle
ConnectNamedPipe
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetACP
GetCPInfo
GetCommState
GetCommandLineA
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesExA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessTimes
GetShortPathNameA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetThreadTimes
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
LocalFree
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenFileMappingA
OpenProcess
PeekNamedPipe
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
SetCommBreak
SetCommState
SetCommTimeouts
SetCurrentDirectoryA
SetEvent
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WaitNamedPipeA
WideCharToMultiByte
WriteFile
lstrcpyA
msvcrt
_chdir
_fileno
_getpid
_itoa
_ltoa
_mkdir
_putenv
_stat
_strdup
_stricmp
_stricoll
_unlink
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__p__pgmptr
__set_app_type
_assert
_beginthread
_cexit
_errno
_fpreset
_fullpath
_iob
_isctype
_locking
_lseeki64
_mkdir
_msize
_onexit
_osver
_pctype
_rmdir
_setjmp
_setmode
_stat
_stricmp
_strnicmp
_telli64
abort
atexit
atoi
atol
calloc
ceil
difftime
exit
fclose
fflush
fgetc
fgetpos
fgets
floor
fopen
fprintf
fputc
fputs
fread
free
fscanf
fsetpos
ftell
fwrite
getenv
gmtime
isspace
iswctype
localeconv
localtime
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
memset
mktime
pow
printf
puts
qsort
rand
realloc
rename
rewind
setlocale
signal
sprintf
sqrt
srand
sscanf
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strrchr
strspn
strstr
strtol
strtoul
system
time
tolower
toupper
towlower
towupper
vfprintf
wcscoll
wcslen
wcsncmp
wcstombs
free
realloc
ole32
CoCreateInstance
CoInitialize
CoUninitialize
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
GetModuleInformation
shell32
DragFinish
DragQueryFileA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
user32
AppendMenuA
BeginPaint
BringWindowToTop
CallWindowProcA
CheckDlgButton
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateCaret
CreateDialogParamA
CreateMenu
CreatePopupMenu
CreateWindowExA
CreateWindowExW
DefDlgProcA
DefWindowProcA
DefWindowProcW
DeleteMenu
DestroyCaret
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DispatchMessageW
DrawEdge
DrawIconEx
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumWindows
FillRect
FindWindowA
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetCapture
GetCaretBlinkTime
GetClassLongA
GetClassNameA
GetClientRect
GetClipboardData
GetClipboardOwner
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemInt
GetDlgItemTextA
GetDoubleClickTime
GetForegroundWindow
GetKeyState
GetKeyboardLayout
GetKeyboardState
GetLastActivePopup
GetMenu
GetMenuDefaultItem
GetMenuItemCount
GetMenuItemInfoA
GetMenuState
GetMenuStringA
GetMessageA
GetMessageTime
GetMonitorInfoA
GetParent
GetQueueStatus
GetScrollInfo
GetSysColor
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindowDC
GetWindowInfo
GetWindowLongA
GetWindowModuleFileNameA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
HideCaret
InsertMenuA
InsertMenuItemA
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageA
IsDlgButtonChecked
IsIconic
IsWindow
IsWindowUnicode
IsWindowVisible
IsZoomed
KillTimer
LoadAcceleratorsA
LoadBitmapA
LoadCursorA
LoadIconA
LoadImageA
LoadStringA
MapDialogRect
MapVirtualKeyA
MessageBeep
MessageBoxA
MessageBoxIndirectA
ModifyMenuA
MonitorFromPoint
MonitorFromRect
MonitorFromWindow
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PeekMessageA
PeekMessageW
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RegisterClassW
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetCapture
SetCaretPos
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetKeyboardState
SetLayeredWindowAttributes
SetMenu
SetMenuDefaultItem
SetMenuItemBitmaps
SetScrollInfo
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
ShowCaret
ShowCursor
ShowWindow
SwitchToThisWindow
SystemParametersInfoA
ToAsciiEx
ToUnicode
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UpdateWindow
ValidateRect
WaitForInputIdle
keybd_event
wsock32
closesocket
connect
gethostbyname
htons
inet_ntoa
ioctlsocket
ntohs
send
shutdown
socket
wtsapi32
WTSRegisterSessionNotification
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 83KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 290KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE