Static task
static1
Behavioral task
behavioral1
Sample
0be520f19c7692f3ea73c7ff74d8a04c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0be520f19c7692f3ea73c7ff74d8a04c.exe
Resource
win10v2004-20231222-en
General
-
Target
0be520f19c7692f3ea73c7ff74d8a04c
-
Size
9.2MB
-
MD5
0be520f19c7692f3ea73c7ff74d8a04c
-
SHA1
d57bb681ffceb4d31cbcb02494f01b6e2d97fae2
-
SHA256
58e0919f652658c6b492a653c2f65c0e858a0b2176a9c0ddc39373a87079f708
-
SHA512
901fb7d926b44883568080e2e4b0d461bfd0d63cc00e4afd15fad92a3b39f37b7a21e881cd462fc5f43b0b909dc9f2569fb34cd35cbb24e0695c859594aae125
-
SSDEEP
196608:xxex1Y4yFSP1MMYBuJdkPbEMDQmGBxWC+AY0zUdvK/o4DxF/6o:w1YdFSP1RY0kPbEiQRiC+tjcoeio
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0be520f19c7692f3ea73c7ff74d8a04c
Files
-
0be520f19c7692f3ea73c7ff74d8a04c.exe windows:4 windows x86 arch:x86
1353b98c8e38f7bc7142e9e4de5c8b46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
FindExecutableW
SHBrowseForFolderW
SHGetMalloc
user32
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
GetLastActivePopup
KillTimer
ShowWindow
PostMessageW
SendMessageW
EnableWindow
SetTimer
SetForegroundWindow
RegisterClassW
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
GetWindowLongW
SetWindowLongW
GetKeyState
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
kernel32
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
FindFirstFileW
SetCurrentDirectoryW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
LoadLibraryA
CreateDirectoryW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetVersionExW
GetModuleFileNameW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
CloseHandle
CreateFileW
ExitProcess
FormatMessageW
GetLastError
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetVolumeInformationW
FlushFileBuffers
FindClose
GetConsoleCP
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
gdi32
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
comctl32
ord17
advapi32
RegQueryValueW
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 18.1MB - Virtual size: 18.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ