Static task
static1
Behavioral task
behavioral1
Sample
0a9a3b1769639779fe36e0625db96336.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a9a3b1769639779fe36e0625db96336.exe
Resource
win10v2004-20231215-en
General
-
Target
0a9a3b1769639779fe36e0625db96336
-
Size
11.0MB
-
MD5
0a9a3b1769639779fe36e0625db96336
-
SHA1
0cfe7953220c0836a573e73ba8ea0e2a7b769663
-
SHA256
6a2445b49b06ed029a5899d6800ca3ad48405971d3581af4432af4dca8e62e1e
-
SHA512
9835e5bbda2a74085a49921a5c8a2af39e5216a99b56af805c92dc628ab41dae4e53c7241e523ab6247469e7f0525f0adf5d7312aa32932b096827bb5c68717f
-
SSDEEP
49152:wc67fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffX:wc6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a9a3b1769639779fe36e0625db96336
Files
-
0a9a3b1769639779fe36e0625db96336.exe windows:5 windows x86 arch:x86
24d4aae6dda34371187af9a3d123ea16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
CreateFileA
GlobalDeleteAtom
FindFirstFileW
lstrlenA
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
CreateDirectoryW
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
SetVolumeMountPointW
OpenSemaphoreA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
SetCommState
WriteFileGather
CreateDirectoryExW
FindResourceExA
AddRefActCtx
GetPrivateProfileStructW
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CompareStringW
GetACP
LCMapStringA
HeapReAlloc
SetCurrentDirectoryA
IsDBCSLeadByteEx
GetProcAddress
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
GetPrivateProfileStringA
SetFileApisToOEM
OpenWaitableTimerA
Process32FirstW
OpenMutexA
LocalAlloc
SetCalendarInfoW
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
IsProcessorFeaturePresent
FlushFileBuffers
CloseHandle
CreateFileW
HeapFree
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
DeleteCriticalSection
HeapValidate
IsBadReadPtr
HeapCreate
WriteConsoleW
SetFilePointer
RtlUnwind
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
GetStringTypeW
LCMapStringW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
RaiseException
user32
GetCursorInfo
GetMenuInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.7MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ