Static task
static1
Behavioral task
behavioral1
Sample
0efbed71bd27bad15de30bfc6fa26620.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0efbed71bd27bad15de30bfc6fa26620.exe
Resource
win10v2004-20231215-en
General
-
Target
0efbed71bd27bad15de30bfc6fa26620
-
Size
40KB
-
MD5
0efbed71bd27bad15de30bfc6fa26620
-
SHA1
08df606969218098a686ac2b4f325d5b7e96e4bb
-
SHA256
d3aeb8d82212ceb246d8c36cd860a890901c6f4236f62967a757b88825c1277f
-
SHA512
72c56d5049be94829ab457ddd35a0a764b52a86eeb71418e7493756585697238bb71583183f951471feca15dd477796208cdf528cffbe81af1c269e8f467d79d
-
SSDEEP
384:aKx1P89XGtRl3uSx6Rm7RJVPPh+vZ/MBCUTEN5botuz9/1HoRGvxDeoKjWhf+:aKxt89XAl3ZvVB+vZ/M0USNdHoo1enK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0efbed71bd27bad15de30bfc6fa26620
Files
-
0efbed71bd27bad15de30bfc6fa26620.exe windows:4 windows x86 arch:x86
582df963cc522cafe009110d87ca3018
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
mfc42
ord1105
ord535
ord941
ord537
ord6930
ord4129
ord6928
ord858
ord4277
ord5683
ord940
ord801
ord6283
ord6282
ord6143
ord541
ord540
ord2818
ord354
ord823
ord6883
ord825
ord665
ord3790
ord860
ord5861
ord1247
ord2820
ord3811
ord837
ord1575
ord4202
ord6877
ord800
ord5216
ord3810
ord920
msvcrt
__CxxFrameHandler
memset
_mbslwr
strcpy
atol
strcmp
sprintf
_splitpath
_ftol
memcpy
free
malloc
realloc
_stricmp
memcmp
_except_handler3
__dllonexit
_onexit
_exit
_XcptFilter
exit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_acmdln
_initterm
__getmainargs
__setusermatherr
kernel32
GetStartupInfoA
lstrcatA
lstrcpyA
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
MultiByteToWideChar
lstrlenW
GetCommandLineA
lstrcmpiA
WaitForSingleObject
lstrlenA
SetLastError
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
MoveFileExA
DeleteFileA
GetCurrentThreadId
GetTickCount
Sleep
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetModuleFileNameA
GetWindowsDirectoryA
CreateDirectoryA
WinExec
user32
TranslateMessage
GetMessageA
KillTimer
PostThreadMessageA
SetTimer
CharNextA
LoadStringA
DispatchMessageA
advapi32
RegDeleteKeyA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
CloseServiceHandle
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
StartServiceCtrlDispatcherA
RegOpenKeyExA
RegCreateKeyExA
ole32
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysAllocString
RegisterTypeLi
VarUI4FromStr
LoadTypeLi
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ