Static task
static1
Behavioral task
behavioral1
Sample
0e017086f8a0d4b395163b9edb8223547915876afdc6280fc1d5f5395bae0ca0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
0e017086f8a0d4b395163b9edb8223547915876afdc6280fc1d5f5395bae0ca0.exe
Resource
win10v2004-20231020-en
General
-
Target
0e017086f8a0d4b395163b9edb8223547915876afdc6280fc1d5f5395bae0ca0
-
Size
5.2MB
-
MD5
0cf69b476c3450aa8dee339243c12819
-
SHA1
9e09c5192fca9d158ae35ae5384529a628499dab
-
SHA256
0e017086f8a0d4b395163b9edb8223547915876afdc6280fc1d5f5395bae0ca0
-
SHA512
3ad402d553726d24e9bd2636ebe4b1d765091482c3475c93e20dcd7fd426b8d0bccd376f48c6669be50821ef18389bf699b5e4bbdbdd1090106965346d648e7b
-
SSDEEP
98304:AL1S32Moz0Qlhmmuajw6ueLDMX7yMAoWrqO8Pv1Zc+LnZzQ4jxhAJXEITFiaaoDc:2qogQumuQwvAssd1k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e017086f8a0d4b395163b9edb8223547915876afdc6280fc1d5f5395bae0ca0
Files
-
0e017086f8a0d4b395163b9edb8223547915876afdc6280fc1d5f5395bae0ca0.exe windows:6 windows x64
d88a5fef5268bca0b66b53e44b596636
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
MultiByteToWideChar
GlobalFlags
GetSystemInfo
GetCurrentProcessId
CreateProcessW
WideCharToMultiByte
VirtualQuery
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
lstrcmpiW
LoadLibraryExW
WriteConsoleW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
GetStdHandle
GetCommandLineA
GetModuleHandleExW
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GetFileAttributesW
FindClose
TerminateProcess
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
FindResourceW
LoadResource
LockResource
FreeResource
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
CreateThread
GetTickCount
WriteFile
LeaveCriticalSection
RaiseException
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
GetModuleFileNameW
CloseHandle
CreateFileW
Sleep
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
ExitProcess
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
LCMapStringW
HeapFree
user32
RegisterClassExW
PostQuitMessage
GetClassInfoExW
CharNextW
SetWindowLongPtrW
DestroyAcceleratorTable
GetClassNameW
DestroyMenu
TranslateAcceleratorW
GetWindowTextW
EndPaint
GetNextDlgTabItem
BeginPaint
IsIconic
DeleteMenu
GetDlgItem
SetFocus
UnregisterClassW
MessageBoxW
DestroyWindow
IsWindow
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
GetWindowLongW
SendMessageW
IntersectRect
IsRectEmpty
WinHelpW
SetMenu
IsWindowEnabled
GetSysColor
IsChild
GetDlgCtrlID
IsDialogMessageW
DrawIcon
FillRect
SetWindowRgn
IsWindowVisible
GetFocus
CallWindowProcW
GetSystemMenu
GetLastActivePopup
GetWindowTextLengthW
SetRect
IsZoomed
ClientToScreen
DestroyIcon
RedrawWindow
ScreenToClient
GetTopWindow
SetWindowTextW
InvalidateRect
SetWindowPos
SetWindowLongW
GetKeyState
SetCursor
GetWindow
ShowWindow
EnableWindow
AdjustWindowRectEx
ReleaseDC
GetClientRect
GetSystemMetrics
GetDC
GetWindowRect
LoadImageW
GetParent
GetDesktopWindow
LoadCursorW
LoadIconW
GetActiveWindow
LoadStringW
GetWindowThreadProcessId
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
GetMonitorInfoW
EnumWindows
PostMessageW
CreateWindowExW
GetWindowLongPtrW
gdi32
CreateEllipticRgn
CreateSolidBrush
CreateRoundRectRgn
GetClipBox
CreateFontIndirectW
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GdiAlphaBlend
GetStockObject
GetDeviceCaps
DeleteObject
SetStretchBltMode
GetObjectW
DeleteDC
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
DragFinish
DragQueryFileW
SHGetSpecialFolderPathW
Shell_NotifyIconW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
ws2_32
WSACleanup
Sections
.text Size: 246KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ