Static task
static1
Behavioral task
behavioral1
Sample
0de483c6fb9700a1064ba8c92c127147.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0de483c6fb9700a1064ba8c92c127147.exe
Resource
win10v2004-20231215-en
General
-
Target
0de483c6fb9700a1064ba8c92c127147
-
Size
186KB
-
MD5
0de483c6fb9700a1064ba8c92c127147
-
SHA1
45b48d74e3fccce04d55f87bd98a093c6d60b2ca
-
SHA256
2fe539f485d942b33b572b49d63d8e02218d0647ed63d71fe839c0d2d3ec76e4
-
SHA512
b48553257f5d073359856e72f02fe6c4c7a2217f717da22a2b0a6f38e5699f98c2e75d76ca36f6632f8d957bd5b11564a69ef57dd69cdcb0031b4eee89d1b03e
-
SSDEEP
3072:P3nH0OlJIPYCZ0O/icbtjeemCxaY1q9iW4hrkE39wx2aoQ0eTlmlX:P3H5XIPYCZ5bIemCxNqqJLwx2M1lg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0de483c6fb9700a1064ba8c92c127147
Files
-
0de483c6fb9700a1064ba8c92c127147.exe windows:4 windows x86 arch:x86
68db25ed04c6d5feb31bd37a1616e9bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindClose
FindFirstFileA
SetFileTime
SystemTimeToFileTime
CreateFileA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
CloseHandle
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
IsBadCodePtr
InitializeCriticalSection
GetOEMCP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadWritePtr
GetTimeZoneInformation
InterlockedExchange
DeleteFileA
CopyFileA
CreateMutexA
GetModuleFileNameA
Sleep
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetLastError
FormatMessageA
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FindNextFileA
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
HeapSize
GetStdHandle
HeapReAlloc
WriteFile
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
IsBadReadPtr
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FreeEnvironmentStringsW
user32
CreateWindowExA
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
MessageBoxA
PostThreadMessageA
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
RegisterClassExA
EnumChildWindows
EnumWindows
GetClassNameA
GetWindowThreadProcessId
SetWindowTextA
SystemParametersInfoA
SetWindowPos
FindWindowA
KillTimer
SetTimer
ShowWindow
advapi32
RegCloseKey
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
ShellExecuteA
ole32
CoCreateGuid
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
netapi32
Netbios
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetSetOptionA
InternetOpenA
InternetReadFile
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
Sections
.data Size: 185KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE