Static task
static1
Behavioral task
behavioral1
Sample
0d040ce1e7f13044e2f1c5a33b68ddf8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d040ce1e7f13044e2f1c5a33b68ddf8.exe
Resource
win10v2004-20231215-en
General
-
Target
0d040ce1e7f13044e2f1c5a33b68ddf8
-
Size
1.4MB
-
MD5
0d040ce1e7f13044e2f1c5a33b68ddf8
-
SHA1
97dd3ee3ec494d7320f26a8f643da8d8ed5101a8
-
SHA256
7fcae805ec5a6aeccb647938a577571f08ba04b3c532ec4c43a4b11c920ab942
-
SHA512
ffc5f1ef4e4898d4449933995cd8edd5c77b9b8544de89c4563ce785148a20dfec025688dc7d5eac26dbd7ae2be2f8f48323d1d8e097a2df2995d4206a809769
-
SSDEEP
24576:v+ZDdU+YdDOl1jjt6A7oEGGaoSCrm3XPUHto:idplljIA7bGVyrKXPUH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d040ce1e7f13044e2f1c5a33b68ddf8
Files
-
0d040ce1e7f13044e2f1c5a33b68ddf8.exe windows:4 windows x86 arch:x86
e7eeac99794bbd3f822d4e9a74c995ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
mpr
WNetCloseEnum
WNetOpenEnumA
WNetEnumResourceA
kernel32
GetSystemInfo
GetVersionExA
SetLastError
WideCharToMultiByte
GetComputerNameA
CloseHandle
ReadFile
CreateFileA
GetFileSize
lstrcmpiA
GetCurrentProcess
Sleep
ReleaseMutex
GetExitCodeProcess
CreateProcessA
CopyFileA
GetLocalTime
GetDriveTypeA
SetFileAttributesA
GetFileAttributesA
GetEnvironmentVariableA
CreateMutexA
GetModuleFileNameA
ExpandEnvironmentStringsA
FreeLibrary
LocalFree
FormatMessageA
GetTickCount
GetModuleHandleA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
FlushFileBuffers
SetStdHandle
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
VirtualQuery
VirtualProtect
GetTimeZoneInformation
LCMapStringW
LoadLibraryA
GetLastError
GetProcAddress
GetCurrentProcessId
SetEndOfFile
HeapSize
CreateDirectoryA
QueryPerformanceCounter
lstrlenA
CompareStringA
CompareStringW
SetEnvironmentVariableA
WaitForSingleObject
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
HeapReAlloc
DeleteFileA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
WriteFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
TerminateProcess
UnhandledExceptionFilter
LCMapStringA
MultiByteToWideChar
user32
GetMessageA
TranslateMessage
DispatchMessageA
ExitWindowsEx
DialogBoxParamA
KillTimer
LoadIconA
SendMessageA
DestroyIcon
SetTimer
PeekMessageA
GetDlgItemTextA
MessageBoxA
SetWindowTextA
SetDlgItemTextA
EnableWindow
GetDlgItem
ShowWindow
GetWindowPlacement
SetWindowPlacement
GetSystemMetrics
SetForegroundWindow
CreateWindowExA
EndDialog
advapi32
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegQueryInfoKeyA
RegEnumKeyExA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ