Static task
static1
Behavioral task
behavioral1
Sample
0eb304a765cbf43ce4471ddf572a45e8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0eb304a765cbf43ce4471ddf572a45e8.exe
Resource
win10v2004-20231215-en
General
-
Target
0eb304a765cbf43ce4471ddf572a45e8
-
Size
46KB
-
MD5
0eb304a765cbf43ce4471ddf572a45e8
-
SHA1
4afceb39631eb1ce6625866b42a0e7691876c068
-
SHA256
a218cbd77001338af8aea58aa1a374f81ef08e9279ef91a16b7246de5806bf08
-
SHA512
83490dc036b36b97ff9c2ccc5be4e9d8ca6a20e3c54c7f37eb5c89400a2edb7e9a2acc5175a07d8388ecb99105cb50e1599567cccc00de01a949bcca3d820137
-
SSDEEP
768:EzN6vDaaPWTe4FTr8gQ11A3LP08k4SF9Ftbf:olaurpQ1WLP0P4qPb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0eb304a765cbf43ce4471ddf572a45e8
Files
-
0eb304a765cbf43ce4471ddf572a45e8.exe windows:4 windows x86 arch:x86
3fc6e110e1c99f22754ca494a7f46924
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetSystemInfo
GetVersionExA
CloseHandle
MoveFileA
CreateFileA
GetModuleFileNameA
GetCurrentDirectoryA
FreeLibrary
FreeResource
SizeofResource
LoadResource
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
Sleep
WriteFile
ExitProcess
user32
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetInputState
PostThreadMessageA
GetMessageA
wsprintfA
FindWindowA
PostMessageA
OpenWindowStationA
shell32
ShellExecuteA
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_strrev
_adjust_fdiv
_controlfp
__setusermatherr
_initterm
strcpy
memset
sprintf
strlen
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ