Static task
static1
Behavioral task
behavioral1
Sample
0737ade5f6c24b0d2789289d43a8ba9e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0737ade5f6c24b0d2789289d43a8ba9e.exe
Resource
win10v2004-20231215-en
General
-
Target
0737ade5f6c24b0d2789289d43a8ba9e
-
Size
128KB
-
MD5
0737ade5f6c24b0d2789289d43a8ba9e
-
SHA1
b4a22d4def52884da16f748c6ced2f49b5645535
-
SHA256
55d36e01cefa74da829bf7d5e83373c5fbfdeb8aa88004d11083ae0ff9477034
-
SHA512
db4bb1c50d91feb4d4c3730225f114c9d33dfd2fb24136be212ef39c51e29998ff1c0554f2da3ef1db3c1474e892e93e08efdb63f039aede798a0c17125b4755
-
SSDEEP
3072:pUGUiO6+oK4yqsjc7CKkYjQR79M4dDr/hfz:p59O6TFyqsjUCGsZdvRz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0737ade5f6c24b0d2789289d43a8ba9e
Files
-
0737ade5f6c24b0d2789289d43a8ba9e.exe windows:4 windows x86 arch:x86
c1e7a58d2443c4eab080d48a88bc3808
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
sensapi
IsNetworkAlive
ole32
CoRegisterClassObject
CoTaskMemFree
RevokeDragDrop
OleFlushClipboard
CoCreateInstance
OleGetClipboard
CoRegisterMessageFilter
OleSetClipboard
RegisterDragDrop
CoRevokeClassObject
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
OleUninitialize
kernel32
FormatMessageA
MultiByteToWideChar
SetUnhandledExceptionFilter
TerminateProcess
GetSystemDirectoryW
GetProcAddress
QueryPerformanceCounter
TlsGetValue
CreateEventW
lstrcmpiW
IsDebuggerPresent
SizeofResource
GetCurrentThreadId
LoadLibraryA
GetModuleHandleA
ProcessIdToSessionId
HeapAlloc
GetModuleHandleW
GetVersionExA
UnhandledExceptionFilter
FindResourceW
SetEvent
GetTempFileNameA
GetProcessHeap
HeapFree
ExitProcess
lstrlenW
AddAtomW
GetCurrentProcess
OutputDebugStringA
CreateProcessA
ExitProcess
GetThreadLocale
GetFileAttributesW
CloseHandle
LoadLibraryExW
InterlockedExchange
GetSystemTimeAsFileTime
LocalAlloc
WaitForSingleObject
GetLocaleInfoA
GetTickCount
RaiseException
InitializeCriticalSection
LoadResource
CreateThread
InterlockedCompareExchange
GetVersion
GetACP
SetLastError
LocalFree
GetCurrentProcessId
LoadLibraryW
GetModuleFileNameW
GetCommandLineW
GetLastError
VirtualProtect
Sleep
GetTempPathA
SetErrorMode
DeleteCriticalSection
GetStartupInfoW
user32
MessageBoxW
RegisterWindowMessageW
SetTimer
MoveWindow
SystemParametersInfoW
GetFocus
BeginPaint
LoadCursorA
GetWindowLongW
ShowWindow
MessageBeep
SetCursor
SetWindowPos
IsWindow
MessageBoxA
GetCursorPos
LoadAcceleratorsW
DestroyWindow
GetWindowRect
GetSystemMetrics
LoadIconW
SetFocus
GetAsyncKeyState
PostThreadMessageW
GetParent
SetWindowLongW
DispatchMessageW
UpdateWindow
SetRect
TranslateMessage
SendMessageW
EnableWindow
GetClientRect
RegisterClassExW
GetClassNameW
OffsetRect
PeekMessageW
EndPaint
UnregisterClassA
IsIconic
FillRect
CharNextW
GetMessageW
WaitMessage
PostQuitMessage
SendMessageA
TranslateAcceleratorW
KillTimer
GetWindowPlacement
LoadCursorW
DestroyIcon
crypt32
CertEnumSystemStoreLocation
CryptMsgGetParam
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ