Static task
static1
Behavioral task
behavioral1
Sample
0cf4dbab8a222bc892466eedc5a42bf5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cf4dbab8a222bc892466eedc5a42bf5.exe
Resource
win10v2004-20231215-en
General
-
Target
0cf4dbab8a222bc892466eedc5a42bf5
-
Size
160KB
-
MD5
0cf4dbab8a222bc892466eedc5a42bf5
-
SHA1
dde8a0b2f7f2d58d10fd8f8bd82054a778e968e8
-
SHA256
437ecf4edda298abee68daa53d2eba8023789e0b3765476d37099c317c37a528
-
SHA512
88be7acb01a48444cd3c6597e329399e6ea42f677fabb27e435447e60bb0da8ff6e0e393fcb80b9be389bbb3a7c146457483bd2209a970ecfe6fa9700181c0f4
-
SSDEEP
3072:zDphfyuIdBILzsXACisO++P5lZNY85JvQYH3rkd9XPKU:z7AILzsXTO++xlA8nUPp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cf4dbab8a222bc892466eedc5a42bf5
Files
-
0cf4dbab8a222bc892466eedc5a42bf5.exe windows:6 windows x86 arch:x86
0fd0a80b6df53cdc9542f82854959f1a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
GetProcessHeap
DecodePointer
GetConsoleMode
GetConsoleOutputCP
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
GetUserDefaultLangID
GetCurrentProcess
HeapFree
FlushFileBuffers
SetFilePointerEx
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
GetStdHandle
WriteFile
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
MultiByteToWideChar
CompareStringW
LCMapStringW
SetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
GetTimeZoneInformation
WriteConsoleW
user32
MessageBoxA
advapi32
AdjustTokenPrivileges
RegCloseKey
LookupPrivilegeValueA
RegCreateKeyExA
RegUnLoadKeyA
RegSetValueExA
OpenProcessToken
RegLoadKeyA
RegOpenKeyExA
RegEnumKeyExA
shell32
ShellExecuteA
Sections
.text Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ