Static task
static1
Behavioral task
behavioral1
Sample
0e6cc2bbc6029ea63f22d11bdfb04271.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e6cc2bbc6029ea63f22d11bdfb04271.exe
Resource
win10v2004-20231215-en
General
-
Target
0e6cc2bbc6029ea63f22d11bdfb04271
-
Size
212KB
-
MD5
0e6cc2bbc6029ea63f22d11bdfb04271
-
SHA1
5ec42091002feb26a84ea98987425540f6b70ae6
-
SHA256
6f56f432f86ef5f120feccfa356e111de9c9629c091074b83a4ea15855743308
-
SHA512
1f5134d678e7efd11787b47a589b9132b16dc089f4ce3ddca4a6d9da3fd981b8f7b95ffa49e8da9f46aea48eda22b08f53fa6833cda2ee11b9839f4ed2d3a2a5
-
SSDEEP
6144:sVJimDTNKp/Op3E3Y6dsyotqTy9SHeQO/YQRm:wJimDTU5Op3EndvotqTyOnkP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e6cc2bbc6029ea63f22d11bdfb04271
Files
-
0e6cc2bbc6029ea63f22d11bdfb04271.exe windows:4 windows x86 arch:x86
0533f8fc6d242682a6c09fa97fd55f21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
WinExec
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
LockResource
LoadResource
FindResourceA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetLocalTime
OutputDebugStringA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
CopyFileA
TerminateThread
GetComputerNameA
GetTickCount
GetCurrentProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
ExitProcess
DuplicateHandle
HeapFree
HeapAlloc
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
GlobalMemoryStatus
GetSystemInfo
lstrlenW
GetModuleHandleA
GetCurrentProcessId
GetSystemDefaultLCID
GetCurrentDirectoryA
ReleaseMutex
OpenEventA
SetErrorMode
MoveFileExA
SetPriorityClass
CreateMutexA
GetTempPathA
GetCurrentThreadId
lstrcmpiA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
CloseHandle
GlobalMemoryStatusEx
CreateEventA
RtlUnwind
RaiseException
HeapReAlloc
InterlockedDecrement
InterlockedIncrement
TlsSetValue
TlsGetValue
ExitThread
GetCommandLineA
GetVersion
TlsAlloc
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
HeapSize
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsBadReadPtr
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvcrt
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_mkdir
_strupr
_strrev
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
12 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE