Static task
static1
Behavioral task
behavioral1
Sample
0ac2cf9ae4ec90572ec03010fe6089f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ac2cf9ae4ec90572ec03010fe6089f8.exe
Resource
win10v2004-20231215-en
General
-
Target
0ac2cf9ae4ec90572ec03010fe6089f8
-
Size
96KB
-
MD5
0ac2cf9ae4ec90572ec03010fe6089f8
-
SHA1
bca495ff0738034ec546b6e7e88749302b312a8e
-
SHA256
c61b995f928bf0ad773bab672a0cd12b2af9d69b82bbd36a98a473bdbd9ab25b
-
SHA512
99e3b0e9f1c9ff3db7098e8ac235e95b1099fe084df5edd070975c340d2df960b4717c089256553d08b807ebca019cf4b5087a5d3e506ed5c42e6592faf63b2d
-
SSDEEP
1536:MNtB0BQy0HdiOAKw+Lzsmk6fehh6LRu1LJq/vgeKo7MnYlNeE1Z:MNTyoialUmk62hkWMgxo7MnYl0cZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ac2cf9ae4ec90572ec03010fe6089f8
Files
-
0ac2cf9ae4ec90572ec03010fe6089f8.exe windows:4 windows x86 arch:x86
32da4516378f8e0a72c5c6329d2dfe0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
OpenEventA
lstrlenA
LockResource
LoadResource
FindResourceA
lstrcpyA
lstrcatA
EnterCriticalSection
RaiseException
DeleteCriticalSection
HeapAlloc
GetProcessHeap
FlushInstructionCache
GetCurrentProcess
HeapFree
LeaveCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
GetCPInfo
GetOEMCP
SetFilePointer
LoadLibraryA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
CloseHandle
lstrcmpA
lstrcpynA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetStdHandle
WriteFile
HeapSize
VirtualFree
HeapCreate
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
HeapReAlloc
ExitProcess
GetProcAddress
TerminateProcess
user32
IsDlgButtonChecked
EnableWindow
MessageBoxA
TranslateMessage
UnregisterClassA
CharNextA
RegisterWindowMessageA
GetWindowLongA
GetParent
GetWindow
GetDlgItem
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
PeekMessageA
GetMessageA
GetWindowRect
DispatchMessageA
SetWindowLongA
CreateDialogParamA
DefWindowProcA
GetSystemMetrics
LoadImageA
SendMessageA
LoadStringA
KillTimer
ShowWindow
SetTimer
GetDlgItemTextA
SetDlgItemTextA
DestroyWindow
PostQuitMessage
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
rasapi32
RasGetEntryDialParamsA
RasSetEntryDialParamsA
RasSetEntryPropertiesA
RasHangUpA
RasGetConnectStatusA
RasEnumDevicesA
RasGetEntryPropertiesA
RasEnumConnectionsA
RasDialA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ