Static task
static1
Behavioral task
behavioral1
Sample
0c5414805693b91d23d8079ba2df4b39.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c5414805693b91d23d8079ba2df4b39.exe
Resource
win10v2004-20231215-en
General
-
Target
0c5414805693b91d23d8079ba2df4b39
-
Size
541KB
-
MD5
0c5414805693b91d23d8079ba2df4b39
-
SHA1
5b9f3266d1c1fae2381df92ad5e04f52f9df6cbc
-
SHA256
d3a102d127de8957731e415937abbb14b065d59c55b76339e2e601e85f166db3
-
SHA512
46b8db6b09b3d27f837d5bd247d03bc05d625bb5c82da0ca6711f661689e1f05cbbcdc71a82fd787df5690bff5d9a042d0f70479b98a77e7b926d953dca7d14a
-
SSDEEP
12288:UhWeLJQ86lGpsTO9j+aPtBYCHotuMj9hw+2+wQAbMGokG1AK:JuRhjBnItxZUMGUeK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c5414805693b91d23d8079ba2df4b39
Files
-
0c5414805693b91d23d8079ba2df4b39.exe windows:4 windows x86 arch:x86
8d543576d7a5b908edb4a03f4cc9e947
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
VirtualProtect
OutputDebugStringA
MultiByteToWideChar
FlushFileBuffers
IsValidLocale
TlsAlloc
GetEnvironmentStringsW
GetACP
GetCurrentThread
GetPriorityClass
GetProcAddress
GetCommandLineA
CompareStringA
GlobalLock
EnumSystemLocalesA
GetEnvironmentStrings
GetTimeZoneInformation
lstrcatA
LoadLibraryA
ReadConsoleInputA
TlsSetValue
HeapReAlloc
HeapCreate
GetTempPathA
IsDebuggerPresent
TlsGetValue
FreeEnvironmentStringsW
GetVersionExA
GetStartupInfoW
TerminateProcess
LCMapStringA
WritePrivateProfileStructA
FindAtomA
UnhandledExceptionFilter
ReadFile
GetCommandLineW
CreateMutexA
GetSystemTimeAsFileTime
GetLocaleInfoA
FreeEnvironmentStringsA
EnterCriticalSection
RtlUnwind
WriteFile
CreateNamedPipeW
GetCurrentThreadId
SetHandleCount
GetCurrentProcess
CloseHandle
GetStdHandle
VirtualQuery
CompareStringW
LeaveCriticalSection
GetStringTypeW
WaitForMultipleObjects
GetLastError
IsBadWritePtr
HeapFree
GetCurrentProcessId
InterlockedExchange
HeapSize
GetTimeFormatA
GetSystemInfo
VirtualFree
GetCompressedFileSizeA
DeleteCriticalSection
HeapDestroy
GetModuleHandleA
HeapAlloc
GetModuleFileNameA
GetOEMCP
GetLocaleInfoW
GetStringTypeA
GetDateFormatA
VirtualAlloc
SetLastError
OpenMutexA
IsValidCodePage
GetTickCount
SetStdHandle
WideCharToMultiByte
GetProfileStringA
InitializeCriticalSection
GetStartupInfoA
GetUserDefaultLCID
SetVolumeLabelA
SetFilePointer
GetModuleFileNameW
GetProcessShutdownParameters
ExitProcess
GetFileType
GetCPInfo
TlsFree
LCMapStringW
SetEnvironmentVariableA
comctl32
InitCommonControlsEx
user32
WINNLSGetIMEHotkey
CheckMenuItem
SendIMEMessageExA
SetPropA
CloseWindow
TranslateAcceleratorA
GetClipboardViewer
RegisterClassExA
RegisterClassA
DrawMenuBar
SetWindowsHookExA
EnumPropsA
SetDlgItemTextW
MessageBeep
UnregisterClassA
CopyAcceleratorTableW
UnregisterClassW
SendMessageW
CreateWindowExA
Sections
.text Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ