Static task
static1
Behavioral task
behavioral1
Sample
0ab961fb846ffd718a45149a43198c08.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ab961fb846ffd718a45149a43198c08.exe
Resource
win10v2004-20231215-en
General
-
Target
0ab961fb846ffd718a45149a43198c08
-
Size
372KB
-
MD5
0ab961fb846ffd718a45149a43198c08
-
SHA1
fddf9a1a84212e6919374388cb7bf1e8cd6eba50
-
SHA256
7919f8b9725ade1e48f56caf7e1f3da49bff1e3b22cc72b0808300974f17a60b
-
SHA512
8218cdc4b65575c5b2240c0e426c8ff550ee32ef16f916366b200bb9cb90d9e6ffb2141ab02e45384aa1b6ec7d03c9800d008ff9640a2bdf6740383096082b65
-
SSDEEP
6144:swYt4oExbCRSW6tadVWGtRDDHS+zWWAOZTW16hGvLWTA/3eB:sgb8l6uWO9DH/WWAOZTW4q3e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ab961fb846ffd718a45149a43198c08
Files
-
0ab961fb846ffd718a45149a43198c08.exe windows:4 windows x86 arch:x86
0578951180bae2e22af0692abdeebbb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__CxxFrameHandler
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_controlfp
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
fgets
longjmp
_setjmp3
_ftime
_endthreadex
_beginthreadex
printf
sprintf
_errno
strerror
perror
__mb_cur_max
_isctype
_pctype
calloc
_acmdln
_iob
fflush
sscanf
strrchr
memcmp
fwrite
fseek
ftell
fread
fputc
wcscat
fopen
fclose
_stricmp
_ftol
rand
srand
free
malloc
strncat
exit
strncmp
_snprintf
atof
memcpy
strchr
_vsnprintf
strcat
_CxxThrowException
??0exception@@QAE@ABV0@@Z
??2@YAPAXI@Z
strtok
strcmp
strstr
strncpy
??3@YAXPAX@Z
memset
system
strcpy
strlen
atoi
_purecall
_memccpy
fprintf
_strdup
_strlwr
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
iphlpapi
GetTcpTable
kernel32
SizeofResource
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
GetProcessAffinityMask
TlsSetValue
FreeLibrary
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
DuplicateHandle
InterlockedIncrement
GetThreadPriority
SuspendThread
GetThreadContext
SetThreadContext
ResumeThread
SetEvent
WaitForSingleObject
ResetEvent
InterlockedDecrement
TerminateThread
DeleteCriticalSection
InitializeCriticalSection
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
GetCurrentProcess
OpenProcess
TerminateProcess
FindResourceA
LoadResource
LockResource
MultiByteToWideChar
GetLocalTime
GetLastError
GetTempPathA
WriteFile
LoadLibraryA
GetProcAddress
CopyFileA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetModuleHandleA
GetModuleFileNameA
FindFirstFileA
GetTickCount
DeleteFileA
GetSystemDirectoryA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
GetStdHandle
AllocConsole
FreeConsole
Sleep
CloseHandle
ExitThread
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindClose
FindNextFileA
user32
ExitWindowsEx
wsprintfA
advapi32
OpenServiceA
RegQueryInfoKeyA
RegEnumKeyExA
EnumServicesStatusA
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
RegCloseKey
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyExA
GetUserNameA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
shell32
ShellExecuteA
ws2_32
ntohs
getsockname
bind
htons
socket
connect
WSACleanup
WSAStartup
gethostname
WSAIoctl
WSAGetLastError
listen
getpeername
ioctlsocket
ntohl
recvfrom
sendto
setsockopt
WSASocketA
getservbyname
shutdown
WSASetLastError
inet_ntoa
htonl
select
accept
closesocket
send
recv
inet_addr
gethostbyaddr
__WSAFDIsSet
gethostbyname
mpr
WNetAddConnection2W
WNetCancelConnection2W
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
dnsapi
DnsQuery_A
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 482KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ