Static task
static1
Behavioral task
behavioral1
Sample
b0bdd1247a6861aea4ab479f76ca494838887a801242ab72b5cae2dc5507a9b4.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
b0bdd1247a6861aea4ab479f76ca494838887a801242ab72b5cae2dc5507a9b4.exe
Resource
win10v2004-20231023-en
General
-
Target
b0bdd1247a6861aea4ab479f76ca494838887a801242ab72b5cae2dc5507a9b4
-
Size
441KB
-
MD5
974f3ae3ba5f4fa5a910c221b0b911e6
-
SHA1
6252b8ce8e6c79d8ad0babc02970fa739531060f
-
SHA256
b0bdd1247a6861aea4ab479f76ca494838887a801242ab72b5cae2dc5507a9b4
-
SHA512
71db195f8fbc192164a5a077d70aa89cdf689399265f599b7f0a7bea1c83b5db7f8273f4bd0dbf972f4580d03dc07f72abdb372c3d04217d3477f0c4a2d3ff8d
-
SSDEEP
6144:pFro3sToskgofcRFRSycQnxXI3NKitwGWlYDAOOvUVwPJGi:pFroiOERDSycQlewJl+k0i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0bdd1247a6861aea4ab479f76ca494838887a801242ab72b5cae2dc5507a9b4
Files
-
b0bdd1247a6861aea4ab479f76ca494838887a801242ab72b5cae2dc5507a9b4.exe windows:6 windows x86
499675429788696416fe19a419eed166
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
GetCommandLineW
lstrcmpiW
LocalFree
GetStartupInfoW
WriteFile
SetEndOfFile
GetFileSize
DeleteFileW
CreateFileW
LoadLibraryExW
CreateEventW
SetEvent
InitializeCriticalSection
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
DecodePointer
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
FreeLibrary
GetCurrentProcess
IsBadReadPtr
GetProcAddress
GetModuleHandleW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
GetLastError
SetUnhandledExceptionFilter
CloseHandle
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
SetStdHandle
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetModuleHandleExW
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
RtlUnwind
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
FormatMessageW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
ReleaseMutex
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
ReadFile
FlushFileBuffers
MulDiv
GetACP
SetFilePointer
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
user32
wsprintfW
SendMessageTimeoutW
FindWindowW
CharNextW
IsWindow
advapi32
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
shell32
SHGetSpecialFolderPathW
ord165
ShellExecuteExW
ole32
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
shlwapi
StrStrIW
PathAppendW
PathCombineW
PathRemoveFileSpecW
PathFileExistsW
gdiplus
GdiplusStartup
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ