Static task
static1
Behavioral task
behavioral1
Sample
0b61cb4c9f3ac4fa58bfac81b215031111a2df6af3a497126dd3c2e16ee969da.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
0b61cb4c9f3ac4fa58bfac81b215031111a2df6af3a497126dd3c2e16ee969da.exe
Resource
win10v2004-20231020-en
General
-
Target
0b61cb4c9f3ac4fa58bfac81b215031111a2df6af3a497126dd3c2e16ee969da
-
Size
152KB
-
MD5
858f4dc9e44cb369fa40cb0c9675d40e
-
SHA1
4ca8d278a354da42829f4773c2ab89f1ad838de2
-
SHA256
0b61cb4c9f3ac4fa58bfac81b215031111a2df6af3a497126dd3c2e16ee969da
-
SHA512
21c25a0e47b793db8d6e9e72df72e3672ef8b854253d853608c946b1b058a933861d080a2ef6e13ec98e26aff55a8b3255af0808f8a998c57f5d29a46ccbb6ba
-
SSDEEP
1536:Q7hSIGrEAstSd9E4h0ZM+PaBJGgnOvRrfQeYoIe:cEIaEltSdCIJGgnOprfbPI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b61cb4c9f3ac4fa58bfac81b215031111a2df6af3a497126dd3c2e16ee969da
Files
-
0b61cb4c9f3ac4fa58bfac81b215031111a2df6af3a497126dd3c2e16ee969da.exe windows:5 windows x86
557c4c0ce9a75167eb79a34e6c5d18c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
DbgPrint
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControlsEx
comdlg32
ChooseFontW
kernel32
CloseHandle
CreateMutexW
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_wcmdln
abort
calloc
exit
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcsncmp
shell32
ShellAboutW
winmm
PlaySoundW
gdi32
CreateFontIndirectW
CreateSolidBrush
DeleteObject
GetStockObject
SelectObject
user32
ActivateKeyboardLayout
BeginPaint
CheckMenuItem
CopyImage
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextW
EndDialog
EndPaint
GetAsyncKeyState
GetDlgItem
GetForegroundWindow
GetKeyState
GetKeyboardLayout
GetKeyboardState
GetMenu
GetMessageExtraInfo
GetMessageW
GetMonitorInfoW
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
IntersectRect
InvalidateRect
IsDlgButtonChecked
KillTimer
LoadImageW
LoadStringW
MapVirtualKeyW
MonitorFromPoint
OffsetRect
PostMessageW
PostQuitMessage
RegisterClassExW
SendInput
SendMessageW
SetTimer
SetWindowPos
SetWindowTextW
ShowWindow
ToUnicode
TranslateMessage
UpdateWindow
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 33KB - Virtual size: 32KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ