Static task
static1
Behavioral task
behavioral1
Sample
0db07278bb93c6ae653f54b597da9c51.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0db07278bb93c6ae653f54b597da9c51.exe
Resource
win10v2004-20231215-en
General
-
Target
0db07278bb93c6ae653f54b597da9c51
-
Size
97KB
-
MD5
0db07278bb93c6ae653f54b597da9c51
-
SHA1
57a6d1dee183700178aac6b65aff438a1deeb548
-
SHA256
98bef119d040d6ecc0cbcf694464b75cddcd3730bb2a8ae59f5f24f4523da81f
-
SHA512
cacfaaf31590e21f6c3c1a78fac34e79722deffb1aa65d8c4633b154e054b425f81c0d99cdd6e36d205e769a1ffbf238b601689565dbcad3cb5607159e56dc3c
-
SSDEEP
1536:pBEuVDFCOFYozx2atAj5lGl4xYXVRzHiYo7iQlCW+5fN4mbMlaQZ:fvDFFYoN2ak5KI9CW+5V4mbMlai
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0db07278bb93c6ae653f54b597da9c51
Files
-
0db07278bb93c6ae653f54b597da9c51.exe windows:4 windows x86 arch:x86
6842eaf4b108cf219a7cf3c905364d37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
kernel32
LoadLibraryA
GetShortPathNameA
GetSystemDirectoryA
GetCurrentProcess
GetSystemInfo
CopyFileA
FreeLibrary
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
lstrcpyA
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetLocaleInfoA
GetWindowsDirectoryA
CreateProcessA
CreateMutexA
GetFileAttributesA
CreateEventA
WaitForSingleObject
CloseHandle
SetEvent
SetConsoleCtrlHandler
GetModuleHandleA
GetProcAddress
Sleep
GetModuleFileNameA
AllocConsole
GetStdHandle
GlobalAlloc
GlobalFree
FormatMessageA
LocalFree
GetLastError
GetVersionExA
OpenProcess
RtlUnwind
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetFileType
RaiseException
GetCommandLineA
CreateDirectoryA
ExitProcess
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
SetHandleCount
GetStartupInfoA
InitializeCriticalSection
TerminateProcess
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
InterlockedExchange
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
SetFilePointer
user32
CreateWindowExA
RegisterClassA
DestroyWindow
DefWindowProcA
advapi32
QueryServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
StartServiceA
RegDeleteValueA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
GetUserNameA
LookupAccountNameA
IsValidSid
GetLengthSid
CopySid
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ