Static task
static1
Behavioral task
behavioral1
Sample
0b66e45407fd41bfd23a4ff3c661042d7ee0ca86f4f5f2b49a86719970bf8060.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0b66e45407fd41bfd23a4ff3c661042d7ee0ca86f4f5f2b49a86719970bf8060.exe
Resource
win10v2004-20230915-en
General
-
Target
0b66e45407fd41bfd23a4ff3c661042d7ee0ca86f4f5f2b49a86719970bf8060
-
Size
492KB
-
MD5
2b5aa04d2f10c2c0ea7f374a28881ed8
-
SHA1
b02b842728b521059f61e1867ba0a3f51409806c
-
SHA256
0b66e45407fd41bfd23a4ff3c661042d7ee0ca86f4f5f2b49a86719970bf8060
-
SHA512
a185fe945a2b6b58c97cfd9e09dc636fdd8f27ee03e8fcb3af726415b38d25a498409a6954ac5f0190011c97cf8814d2477d945a13e5567acda8b81056902a2e
-
SSDEEP
6144:T+sClA/xW75lClmx2APlMwUhHxcOrvsjXxzKCsu6+VXf6VpK4:TQlA0x2APaPHxzQXxTsu6+VXf664
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b66e45407fd41bfd23a4ff3c661042d7ee0ca86f4f5f2b49a86719970bf8060
Files
-
0b66e45407fd41bfd23a4ff3c661042d7ee0ca86f4f5f2b49a86719970bf8060.exe windows:5 windows x86
6f6866087556ce9562a83a24ed520f09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetCurrentDirectoryA
GetCPInfo
GetOEMCP
HeapFree
ExitProcess
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetSystemTimeAsFileTime
GetFullPathNameW
HeapAlloc
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
HeapCreate
HeapDestroy
VirtualFree
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetACP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
GetLocaleInfoA
InterlockedExchange
GetFileAttributesA
GlobalFlags
GlobalAddAtomA
CreateFileA
FlushFileBuffers
SetFilePointer
WriteFile
lstrcmpA
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetModuleHandleW
CompareStringA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
DeleteFileW
GetCurrentProcess
GetCurrentProcessId
CreateDirectoryW
SetUnhandledExceptionFilter
FindClose
FindNextFileW
FindFirstFileW
lstrcpyW
SetLastError
GetCurrentThreadId
CreateFileW
GetModuleFileNameW
OpenMutexA
GetLocalTime
Sleep
SetEvent
LoadLibraryA
GetProcAddress
MultiByteToWideChar
FreeLibrary
InterlockedCompareExchange
lstrlenA
CloseHandle
GetModuleFileNameA
OpenEventA
LockResource
GetPrivateProfileStringA
GetLastError
SizeofResource
WideCharToMultiByte
FindResourceExA
LoadResource
GetStdHandle
FindResourceA
user32
SetMenu
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetForegroundWindow
IsIconic
PostMessageA
SetWindowPos
SetWindowLongA
IsWindow
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
wsprintfW
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
GetDlgItem
MapWindowPoints
gdi32
SetMapMode
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
SetWindowExtEx
GetDeviceCaps
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantChangeType
VariantClear
SystemTimeToVariantTime
VarUdateFromDate
VariantTimeToSystemTime
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
dbghelp
MiniDumpWriteDump
Sections
.text Size: 353KB - Virtual size: 353KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ