Static task
static1
Behavioral task
behavioral1
Sample
0bc7a3a8a1a14afb588f1f99387cba56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bc7a3a8a1a14afb588f1f99387cba56.exe
Resource
win10v2004-20231215-en
General
-
Target
0bc7a3a8a1a14afb588f1f99387cba56
-
Size
457KB
-
MD5
0bc7a3a8a1a14afb588f1f99387cba56
-
SHA1
7784b39c6fe6bd883a52affa750245744adac4a2
-
SHA256
20bcfe38fb69feea63d6e9eaa6ccd61005284011734bc4147b9103653d15d64c
-
SHA512
cae85896cf11912c16e3948a3ad8566b5f09e6eaecd07bee1eb6e93bbab0a22693edc162d4ac52b9736be14b032566fda583ae681efa41180325811d1d8e74ab
-
SSDEEP
12288:/ISeSjcA3z0+eW6Cxfhgs4BiWHXgq9Egr:JDl0yxmliWgUEgr
Malware Config
Signatures
Files
-
0bc7a3a8a1a14afb588f1f99387cba56.exe windows:4 windows x86 arch:x86
7550a75d9176532365d416434cf05a41
Code Sign
c4:b9:d7:bb:b1:e0:98:6a:46:2c:f3:4f:9b:a5:fd:3a:7d:41:67:06Signer
Actual PE Digestc4:b9:d7:bb:b1:e0:98:6a:46:2c:f3:4f:9b:a5:fd:3a:7d:41:67:06Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawEx
ImageList_Remove
ImageList_BeginDrag
ImageList_Create
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
LockResource
WriteFile
GetLastError
CreateFileMappingA
CloseHandle
FileTimeToDosDateTime
EnumCalendarInfoA
CreateEventA
CompareStringA
FreeResource
GetCommandLineA
SetStdHandle
SetFilePointer
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
GetModuleHandleW
ReadFile
CreateFileA
VirtualAlloc
ExitProcess
GetVersionExA
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
CreateThread
GetModuleHandleA
GetProcAddress
FlushFileBuffers
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
user32
RegisterClassW
GetDC
MessageBoxA
GetSystemMetrics
CreateDialogParamA
CreateWindowExA
GetWindowThreadProcessId
IntersectRect
GetCapture
GetClassInfoA
GetSystemMenu
CharNextA
LoadStringA
GetClientRect
DialogBoxParamA
gdi32
ExcludeClipRect
SetBkColor
SelectPalette
SetBrushOrgEx
SetEnhMetaFileBits
SetPixel
SetROP2
StretchBlt
UnrealizeObject
CreatePalette
GetDeviceCaps
Rectangle
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExA
GetUserNameA
shell32
StrStrIA
ole32
CoUninitialize
CoTaskMemAlloc
oleaut32
SafeArrayGetLBound
SafeArrayRedim
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
Sections
.text Size: 408KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Cdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ