Static task
static1
Behavioral task
behavioral1
Sample
02df0cc8c39e060178d6409a656c1ea7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02df0cc8c39e060178d6409a656c1ea7.exe
Resource
win10v2004-20231215-en
General
-
Target
02df0cc8c39e060178d6409a656c1ea7
-
Size
1.3MB
-
MD5
02df0cc8c39e060178d6409a656c1ea7
-
SHA1
ddfb93a870bf95332e530acc5406b7a3a46b6a41
-
SHA256
d53214a1a18fc21e25b4385645596b08eb2e5b5bab6e804e43dbcddf8dd8d852
-
SHA512
b4fd023c298d96f04507f22719a3b4ed6e8318d6572f0e6a8da0c5803368209679f26b28c5c85baffb2287472ed667977c8e35c983fb68df3ce0e572fa404283
-
SSDEEP
24576:eeM8I3Na3JvCnaVoDFVgzU//tDELHSmLpMvAykkkkkk0CWTj0KdJwkvmCjhC:eeM8I3NyJvmdFVgzUXtDEjpMGTj0qKkI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02df0cc8c39e060178d6409a656c1ea7
Files
-
02df0cc8c39e060178d6409a656c1ea7.exe windows:5 windows x86 arch:x86
754791851bc64070f494a6e7c0c2ab21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultUILanguage
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCurrentProcess
CloseHandle
OpenProcess
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
ExpandEnvironmentStringsW
GetTempFileNameW
GetFileSize
FindFirstFileW
FreeLibrary
LoadLibraryExW
MoveFileExW
CreateDirectoryW
VirtualFree
WriteFile
CopyFileW
GetFileAttributesW
FileTimeToSystemTime
ReadFile
CreateFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
VirtualAlloc
FindClose
RemoveDirectoryW
FindNextFileW
GetFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
DeleteFileW
GetCommandLineW
LocalFree
CreateMutexW
SetFilePointer
CreateProcessW
GetTickCount
FormatMessageA
SetLastError
GetModuleHandleA
GetCurrentThreadId
OutputDebugStringA
ReleaseMutex
GetCurrentProcessId
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetExitCodeProcess
TerminateProcess
GetStdHandle
WaitForSingleObject
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DuplicateHandle
GetVersionExW
InterlockedExchangeAdd
QueryPerformanceCounter
InterlockedCompareExchange
GetUserDefaultLangID
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEndOfFile
SetFilePointerEx
SetFileTime
FlushFileBuffers
GetFileInformationByHandle
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
IsDebuggerPresent
RtlCaptureStackBackTrace
Sleep
RaiseException
CreateThread
WideCharToMultiByte
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
LoadLibraryW
ReleaseSemaphore
CreateSemaphoreW
SetEvent
WaitNamedPipeW
TransactNamedPipe
ResetEvent
SetNamedPipeHandleState
WaitForMultipleObjects
GetDateFormatW
GetShortPathNameW
FindResourceW
LoadResource
SizeofResource
LockResource
WTSGetActiveConsoleSessionId
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
PeekNamedPipe
GetFileType
HeapAlloc
GetProcessHeap
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapReAlloc
ExitProcess
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
InterlockedExchange
LCMapStringA
LCMapStringW
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LoadLibraryA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLastError
user32
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowLongW
GetWindowLongW
MessageBoxW
LoadIconW
CallNextHookEx
FindWindowW
SendMessageTimeoutW
IsWindow
SendMessageW
CharUpperW
FindWindowExW
GetWindowThreadProcessId
advapi32
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
InitializeSecurityDescriptor
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTraceEnableFlags
RegCloseKey
RegSetValueExW
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
GetUserNameW
LookupAccountSidW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
ConvertSidToStringSidW
CreateProcessAsUserW
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
shell32
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
SHChangeNotify
ord59
ord680
SHFileOperationW
ole32
CoInitializeEx
CoSetProxyBlanket
PropVariantClear
CoCreateInstance
CoUninitialize
shlwapi
SHDeleteKeyW
UrlCanonicalizeW
SHDeleteEmptyKeyW
SHStrDupW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
winmm
timeGetTime
urlmon
CreateURLMoniker
wtsapi32
WTSQueryUserToken
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
ws2_32
ntohl
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
Sections
.text Size: 490KB - Virtual size: 490KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 359KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 372KB - Virtual size: 371KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.prdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE