Static task
static1
Behavioral task
behavioral1
Sample
0a4f0d11ce413d0a244127cae0d3e1e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a4f0d11ce413d0a244127cae0d3e1e6.exe
Resource
win10v2004-20231215-en
General
-
Target
0a4f0d11ce413d0a244127cae0d3e1e6
-
Size
112KB
-
MD5
0a4f0d11ce413d0a244127cae0d3e1e6
-
SHA1
ea6d3db508b2282a4e78dd728073a2a45732b5d3
-
SHA256
7bb48a33a46482a27a3e1198d20e22baa5fe10d11e5a5eda8f6a362d7dabd620
-
SHA512
5002f484d3c64061ba04aebca54062ca64ee7706e5a27bd5f307277aba83d45966a2fca69e5c2f53a3c35838203f9ca2dec0d471a55cffe6fec034516224b0a4
-
SSDEEP
1536:0nzRmz/O/459K+q8KZK4P9fmsGdrl2BlA5IifBeVejGYi/SWIK:U4z/O/M9KWKzCxwBlA5I5VcwSWIK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a4f0d11ce413d0a244127cae0d3e1e6
Files
-
0a4f0d11ce413d0a244127cae0d3e1e6.exe windows:4 windows x86 arch:x86
2466f72df61f40db2ed3d0c0b780c7e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
GetLastError
CloseHandle
WaitForSingleObject
CreateProcessA
CreateDirectoryA
GetModuleFileNameA
GetVersionExA
LoadLibraryA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
GetTempPathA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
HeapAlloc
HeapFree
GetFileType
CreateFileA
ReadFile
WriteFile
SetFilePointer
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
TerminateProcess
user32
IsDialogMessageA
TranslateMessage
DispatchMessageA
CreateDialogParamA
GetDlgItem
SetDlgItemTextA
MessageBoxA
SendMessageA
DestroyWindow
PeekMessageA
shell32
SHFileOperationA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ