Static task
static1
Behavioral task
behavioral1
Sample
0a3ca3a98aedf00bd37679a9b8249c5f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a3ca3a98aedf00bd37679a9b8249c5f.exe
Resource
win10v2004-20231215-en
General
-
Target
0a3ca3a98aedf00bd37679a9b8249c5f
-
Size
84KB
-
MD5
0a3ca3a98aedf00bd37679a9b8249c5f
-
SHA1
84726253bbc581bce1fb06fb4d916faab5d26cff
-
SHA256
52a4c558f606a5365a704579fc42d9e9d1d6222c030a07c0a76a9623257be046
-
SHA512
526fba1aa85a78097b1a5e2cb7f780da497e8c09f76b86b77c98a0358896191c7c70b39debc5b812961cce281fc82f6d3b57a8680ca28f680a2ed28fe42c0dea
-
SSDEEP
1536:j/shsMz00ekiRDf16dX5mT9KNkalMHn8OFrCNnz+7/5mx:jDMz0bkiRz8dAKOJFrCNnz+7/5mx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a3ca3a98aedf00bd37679a9b8249c5f
Files
-
0a3ca3a98aedf00bd37679a9b8249c5f.exe windows:4 windows x86 arch:x86
c5a7989328f1393b9a0b02a4b3e7e7d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
GetCurrentThread
EnterCriticalSection
GetVersionExA
VirtualFree
GetProcessHeap
SetFileAttributesA
IsDBCSLeadByte
GetTempFileNameA
GetWindowsDirectoryA
GetTempPathA
FindClose
ResumeThread
lstrcpyW
LoadLibraryA
CreateThread
ExitThread
FreeLibrary
MultiByteToWideChar
GetExitCodeThread
GetDriveTypeA
SetThreadPriority
HeapAlloc
InitializeCriticalSection
GetCurrentProcess
GetDiskFreeSpaceA
CreateDirectoryA
HeapFree
FindFirstFileA
WaitForSingleObject
GetLastError
GetModuleFileNameA
lstrcmpiA
FindNextFileA
GetProcAddress
GetFullPathNameA
GetLogicalDrives
lstrcatA
LeaveCriticalSection
GetFileTime
GetFileAttributesA
OutputDebugStringW
RemoveDirectoryA
DeleteCriticalSection
SetPriorityClass
CopyFileA
CreateProcessA
GetLocaleInfoA
Sleep
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
GetCurrentThreadId
lstrlenA
lstrcmpA
GetPrivateProfileStringA
lstrcpyA
CloseHandle
GlobalFree
ReadFile
GlobalAlloc
WriteFile
SetFileTime
GetFileSize
CreateFileA
VirtualAlloc
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
HeapSize
RtlUnwind
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
user32
ShowWindow
SetWindowLongA
SetDlgItemTextA
ExitWindowsEx
SetFocus
SendMessageA
PostMessageA
GetWindowLongA
ReleaseDC
CheckRadioButton
wsprintfW
GetDlgItem
SetForegroundWindow
GetDC
SetWindowTextA
EndDialog
EnableWindow
FindWindowA
LoadCursorA
DialogBoxParamA
SetCursor
CheckDlgButton
GetWindowTextA
CharNextA
wvsprintfA
wsprintfA
MessageBoxA
SendDlgItemMessageA
gdi32
CreateDIBSection
DeleteObject
advapi32
RegFlushKey
OpenProcessToken
RegDeleteKeyA
FreeSid
RegQueryValueExA
RegOpenKeyExA
EqualSid
RegCreateKeyExA
RegSetValueExA
RegCloseKey
AllocateAndInitializeSid
GetTokenInformation
shell32
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationA
SHBrowseForFolderA
ole32
CoUninitialize
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoInitializeEx
StringFromGUID2
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ