Static task
static1
Behavioral task
behavioral1
Sample
0daba447dfd17a6eab974fd086702e33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0daba447dfd17a6eab974fd086702e33.exe
Resource
win10v2004-20231222-en
General
-
Target
0daba447dfd17a6eab974fd086702e33
-
Size
146KB
-
MD5
0daba447dfd17a6eab974fd086702e33
-
SHA1
9107c9b4ac633d3d8ca5bde92795aae75060512e
-
SHA256
e6ce34578732cbde7dccc74bb2c54f5371d04c318bc9149bc6e56860b5f204f8
-
SHA512
b1c3dac4c6dcbd725188cb4c72a63fa4fca6bfa464c76f87071a80fbe1904cfa77134fc821c2adfeb36dabb21c36bb80343185a9b8c2be3e7bef9fc7afa2e392
-
SSDEEP
3072:s8tOoRpibKMsjBShhnDjUaXoVBxcA+jMVu1FE3W87a2+pk/:s8tRpipschhnka4DxYQV6FwW87oy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0daba447dfd17a6eab974fd086702e33
Files
-
0daba447dfd17a6eab974fd086702e33.exe windows:4 windows x86 arch:x86
6ff17e15b4dd569b039973ccf414da18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevA
CharUpperW
CharNextA
CharUpperA
oleaut32
SysStringByteLen
VariantCopy
VariantClear
SysFreeString
SysAllocString
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
fprintf
memset
memcpy
fputc
fputs
fflush
fgetc
fclose
_iob
free
malloc
memmove
strlen
memcmp
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
VirtualAlloc
GetTickCount
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
OpenFileMappingA
GetProcessTimes
LocalFree
MapViewOfFile
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetCurrentDirectoryW
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ