Static task
static1
Behavioral task
behavioral1
Sample
0acbce0e546731a9ca788e33eec306d1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0acbce0e546731a9ca788e33eec306d1.exe
Resource
win10v2004-20231215-en
General
-
Target
0acbce0e546731a9ca788e33eec306d1
-
Size
1.8MB
-
MD5
0acbce0e546731a9ca788e33eec306d1
-
SHA1
cb28a8511e8664c5aeee5f94ee63e23784f5d737
-
SHA256
1fd84c1bc31580eacdb424dd4dc5f0a465055bde15b21ec838fb58f5d6705881
-
SHA512
0b671ab26eac459bff6aeb32604eaffc5d1686d81a344398bc78ab1fcbadc4dc8864515648a6264f0e6ac2899e55a9c701b2eb281de542de5eb7aa27e4c3cfc1
-
SSDEEP
24576:VlEWzJDmwqN/k0dacRkElQ1J7jGC1PJxoceXYR3+LqW9haSKcfCVkPxNachZbXB7:oWtSwqN8oaFEK1JnzJdeXuWpAOKcvbks
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0acbce0e546731a9ca788e33eec306d1
Files
-
0acbce0e546731a9ca788e33eec306d1.exe windows:5 windows x86 arch:x86
170f34733f3945a9c54af93f5ba6abee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
TerminateThread
WideCharToMultiByte
LocalFileTimeToFileTime
GetCurrentDirectoryW
ReadFile
CreateFileW
GetFileAttributesW
WriteFile
SetFilePointer
GetTempPathW
CreateDirectoryW
CreateThread
CloseHandle
GetCurrentProcess
GetModuleFileNameW
DeleteFileW
MultiByteToWideChar
SizeofResource
Sleep
WaitForSingleObject
SystemTimeToFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
GetProcessHeap
SetEndOfFile
LoadLibraryA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
LoadResource
GetLastError
FindResourceW
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
GetVersionExW
GetProcAddress
GetModuleHandleW
GetTickCount
FreeLibrary
GetACP
ExitProcess
LockResource
GetFileType
DuplicateHandle
DosDateTimeToFileTime
GetFileSize
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
MulDiv
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
HeapFree
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
HeapReAlloc
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
GetStdHandle
GetModuleFileNameA
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetModuleHandleA
user32
InvalidateRect
SetTimer
KillTimer
SetCapture
ReleaseCapture
EndPaint
BeginPaint
RedrawWindow
PtInRect
ReleaseDC
DestroyWindow
SetFocus
GetFocus
CreateWindowExW
MapWindowPoints
SendMessageW
UpdateLayeredWindow
GetWindowRect
IsRectEmpty
GetUpdateRect
IsIconic
GetWindow
ScreenToClient
GetCursorPos
GetParent
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
LoadCursorW
DefWindowProcW
MoveWindow
ShowWindow
IsZoomed
GetWindowRgn
IsWindowVisible
GetPropW
SetPropW
GetWindowLongW
EnableWindow
GetMonitorInfoW
MonitorFromWindow
GetDesktopWindow
LoadImageW
GetSystemMetrics
CallWindowProcW
ClientToScreen
RegisterClassW
GetClassInfoExW
CharNextW
OffsetRect
InflateRect
PostMessageW
wvsprintfW
SetWindowRgn
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
SetCursor
CreateCaret
IntersectRect
SetRect
FillRect
DrawTextW
CharPrevW
HideCaret
SetCaretPos
GetSysColor
GetCaretPos
InvalidateRgn
CreateAcceleratorTableW
GetAsyncKeyState
PostQuitMessage
IsWindow
SetWindowPos
SetWindowLongW
GetClientRect
GetDC
GetKeyState
MessageBoxW
wsprintfW
UpdateWindow
ShowCaret
advapi32
RegOpenKeyW
RegCreateKeyW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
shell32
ShellExecuteW
ord165
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
SHCreateDirectoryExW
ole32
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromString
OleLockRunning
iphlpapi
GetAdaptersInfo
ws2_32
WSACleanup
inet_ntoa
gethostbyname
gethostname
WSAStartup
gdiplus
GdipDeleteBrush
GdipFree
GdipAlloc
GdipSetStringFormatLineAlign
GdipCreateFromHDC
GdiplusShutdown
GdipDrawString
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipCloneBrush
GdipCreateStringFormat
GdipDeleteStringFormat
GdipDeleteGraphics
GdipDeleteFont
GdiplusStartup
GdipCreateLineBrushI
GdipSetTextRenderingHint
GdipSetStringFormatAlign
shlwapi
PathFileExistsW
msimg32
AlphaBlend
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
wininet
InternetConnectA
InternetConnectW
InternetOpenW
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpSendRequestW
InternetReadFile
comctl32
_TrackMouseEvent
ord17
gdi32
RestoreDC
SaveDC
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
SetDIBColorTable
GetSystemPaletteEntries
PtInRegion
CreateRectRgn
CreateRoundRectRgn
ExtTextOutW
SetBkColor
DeleteDC
Rectangle
SetBkMode
SetTextColor
CreatePatternBrush
CombineRgn
ExtCreateRegion
SelectClipRgn
ExtSelectClipRgn
GetObjectA
GetDeviceCaps
GetCharABCWidthsW
GetTextExtentPoint32W
TextOutW
CreateSolidBrush
SetWindowOrgEx
DeleteObject
SelectObject
GetTextMetricsW
BitBlt
GetStockObject
GetObjectW
CreateFontIndirectW
CreatePen
GdiFlush
RoundRect
CreatePenIndirect
MoveToEx
LineTo
SetStretchBltMode
StretchBlt
GetClipBox
CreateRectRgnIndirect
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 405KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ