Static task
static1
Behavioral task
behavioral1
Sample
087b48460ce60e1d4f61e1adfbbdf4f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
087b48460ce60e1d4f61e1adfbbdf4f5.exe
Resource
win10v2004-20231222-en
General
-
Target
087b48460ce60e1d4f61e1adfbbdf4f5
-
Size
332KB
-
MD5
087b48460ce60e1d4f61e1adfbbdf4f5
-
SHA1
ace34762063a88b3fe203b926e12574291cc60b8
-
SHA256
6ec1b76c66142c51d4828ed9ebd3c91da60284c7b62b5586ffa8cae0d4ee79d1
-
SHA512
38cbda2bcbe22c751aa023546ebf6f50da89b1644edea2c08d231cd3329481d09a38ba5cd2ee3182dc374fd63da2a506bae6ed8746597f96a60c32d927c3959f
-
SSDEEP
6144:t/aI8YXafIMObchwOCqWz4Uqtyqw0OOMYuczV4wNYBMacucwkZT:0I8SmINcon4UlqFOOMmZ4XB9Pc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 087b48460ce60e1d4f61e1adfbbdf4f5
Files
-
087b48460ce60e1d4f61e1adfbbdf4f5.exe windows:4 windows x86 arch:x86
ca71c19f759ed23f0af0890db640a60c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
GetModuleFileNameW
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenEventW
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
ReadFile
RemoveDirectoryW
ResumeThread
RtlUnwind
SearchPathW
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrcmpW
lstrcmpiA
lstrlenA
lstrlenW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
FreeLibrary
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
EnumUILanguagesW
EnterCriticalSection
DisableThreadLibraryCalls
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CreateDirectoryW
CopyFileW
CompareStringW
CompareStringA
LockResource
CloseHandle
user32
MsgWaitForMultipleObjects
PeekMessageW
PostMessageW
SendDlgItemMessageW
SendMessageTimeoutW
SetCursor
SetTimer
TranslateMessage
LoadStringW
LoadCursorW
KillTimer
GetWindow
GetTopWindow
GetSystemMetrics
GetMessageW
GetClassNameA
EndDialog
DispatchMessageW
DialogBoxParamW
DestroyIcon
CharNextW
CharLowerW
LoadImageW
advapi32
RegOpenKeyExW
EnumServicesStatusExW
DuplicateTokenEx
CreateProcessAsUserW
CopySid
ConvertStringSidToSidW
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSaveKeyW
RegSetValueExW
RevertToSelf
SetFileSecurityW
SetSecurityDescriptorOwner
GetLengthSid
GetTokenInformation
ImpersonateLoggedOnUser
InitializeSecurityDescriptor
LookupPrivilegeNameW
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExA
FreeSid
shlwapi
StrTrimW
StrToIntW
StrToIntExW
StrStrW
ChrCmpIA
PathAddBackslashW
PathAddExtensionW
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathFindNextComponentW
PathGetCharTypeW
PathGetDriveNumberW
PathIsDirectoryW
PathIsFileSpecW
PathIsPrefixW
PathIsRootW
PathIsUNCServerW
PathIsURLW
PathRemoveBackslashW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRenameExtensionW
PathSkipRootW
PathUnquoteSpacesW
SHDeleteEmptyKeyW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
StrStrIW
SHSetValueW
StrChrIW
StrChrW
StrCmpIW
StrCmpNIW
StrCmpNW
StrCmpW
StrDupW
StrRChrW
StrRetToStrW
StrSpnW
SHQueryValueExW
ole32
StringFromGUID2
CreateBindCtx
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoCreateInstance
CoCreateGuid
oleaut32
SysStringByteLen
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
SafeArrayPutElement
SafeArrayUnaccessData
SysAllocString
SysAllocStringByteLen
SysFreeString
shell32
SHGetDesktopFolder
ShellExecuteExW
SHChangeNotify
setupapi
SetupCloseInfFile
SetupFindFirstLineW
SetupFindNextLine
SetupGetBinaryField
SetupGetIntField
SetupGetLineTextW
SetupGetStringFieldW
SetupOpenInfFileW
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ