Static task
static1
Behavioral task
behavioral1
Sample
0a83e39d1de74135045823f6fb409196.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a83e39d1de74135045823f6fb409196.exe
Resource
win10v2004-20231215-en
General
-
Target
0a83e39d1de74135045823f6fb409196
-
Size
52KB
-
MD5
0a83e39d1de74135045823f6fb409196
-
SHA1
5a0c7e57b641cd28ea87fc2eae8c2d651943bab1
-
SHA256
e0ae3d0a85ab9ab6486e45b18c6a0f056bc21785104f71815fd8f55b78911712
-
SHA512
06f1b56e10ac7d9a1765435e2ef01869a9ef8e0ed3292586bd36658104ac54801f000ec8d5a3c64780ff33f17faa7f510c392bf63372a858bb81da65fe9c3529
-
SSDEEP
768:wnjUJU5NGxb/saqlUEsCTvqpy2tgNw8FhA785PVGWylo:HmNyjAUaTvqpy2tzyRrnyl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a83e39d1de74135045823f6fb409196
Files
-
0a83e39d1de74135045823f6fb409196.exe windows:4 windows x86 arch:x86
134a2dcf34ff366748ecd49ecf89eae9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetWindowsDirectoryA
ReleaseMutex
GetExitCodeThread
CreateThread
CreateEventA
WaitForSingleObject
CreateMutexA
Sleep
SetUnhandledExceptionFilter
GetModuleFileNameA
ResetEvent
GetLastError
GetVersionExA
HeapReAlloc
VirtualProtect
GetLocaleInfoA
VirtualAlloc
CreateProcessA
ExitProcess
GetSystemDirectoryA
MoveFileExA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
HeapFree
lstrlenA
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
GetCurrentProcess
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
GetProcessHeap
HeapAlloc
SetEvent
GetStartupInfoA
GetCommandLineA
GetACP
GetOEMCP
GetCPInfo
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
HeapSize
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
user32
SetWindowsHookExA
advapi32
QueryServiceStatusEx
InitializeSecurityDescriptor
GetTokenInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AllocateAndInitializeSid
GetLengthSid
AddAce
IsValidSecurityDescriptor
OpenSCManagerA
OpenServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE