Static task
static1
Behavioral task
behavioral1
Sample
0960daa763b215a746668c4b16310cd8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0960daa763b215a746668c4b16310cd8.exe
Resource
win10v2004-20231215-en
General
-
Target
0960daa763b215a746668c4b16310cd8
-
Size
416KB
-
MD5
0960daa763b215a746668c4b16310cd8
-
SHA1
5009d73f58e1af7b38343edcd686337fdb37e499
-
SHA256
fefc4bde9be0950ba0941f7692ce654642b72ffac69b11eb6073594aa14fe897
-
SHA512
e425919952cc7683298ecc1f85cbac7f20f3b86d16f947bfdd72fed7b1acc98c43f761c7c942b21482126064efe0b537542df28ce6290e6c474bb20057fa1e8f
-
SSDEEP
6144:My+Z/Bk+kv4w/bcExlKa9GmxMVAcuQFSqU5G9rq8dsg7vtBeI1vUS5:6NBgvngExl97MucHOYrqCv77b1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0960daa763b215a746668c4b16310cd8
Files
-
0960daa763b215a746668c4b16310cd8.exe windows:4 windows x86 arch:x86
428c10f1ccb693143a0a70f0758900ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
GetLocaleInfoA
lstrcpyA
CreateSemaphoreA
GetCommandLineW
GetEnvironmentVariableW
HeapAlloc
UnhandledExceptionFilter
LeaveCriticalSection
HeapDestroy
SetLastError
SetHandleCount
WriteProfileStringW
ResumeThread
LCMapStringA
LCMapStringW
WriteFile
GetEnvironmentStringsW
GetFileType
LoadLibraryW
IsValidCodePage
DeleteCriticalSection
GetLastError
EnterCriticalSection
FlushInstructionCache
GetStartupInfoA
SetEnvironmentVariableA
GetEnvironmentStrings
GetProcAddress
IsBadReadPtr
GetDateFormatA
TlsGetValue
FlushConsoleInputBuffer
CompareStringW
DeleteFileA
GetStartupInfoW
VirtualQuery
HeapCreate
TlsFree
InitializeCriticalSection
OpenMutexA
GetStringTypeA
MultiByteToWideChar
GetCommandLineA
HeapReAlloc
GetVersionExA
ExitProcess
GetTempPathW
GetCurrentThread
VirtualAlloc
TlsSetValue
QueryPerformanceCounter
GetCurrentProcess
GetTimeFormatA
GetModuleHandleA
FreeEnvironmentStringsW
GetStringTypeW
GetSystemInfo
GetCurrentThreadId
IsBadWritePtr
VirtualProtect
CompareStringA
GetACP
GetCurrentProcessId
GetModuleFileNameA
GetTimeZoneInformation
WaitForSingleObject
ReleaseSemaphore
GetTickCount
GetModuleFileNameW
MoveFileW
FreeEnvironmentStringsA
IsValidLocale
HeapSize
RtlUnwind
EnumSystemLocalesA
GetSystemTimeAsFileTime
InterlockedExchange
GetUserDefaultLCID
GetLogicalDriveStringsW
CreateToolhelp32Snapshot
GetCPInfo
WideCharToMultiByte
GetLocaleInfoW
GetStdHandle
HeapFree
TerminateProcess
LoadLibraryA
RaiseException
TlsAlloc
VirtualFree
GetOEMCP
wininet
InternetCanonicalizeUrlW
ReadUrlCacheEntryStream
CreateUrlCacheContainerW
InternetShowSecurityInfoByURLW
InternetAutodial
InternetConfirmZoneCrossingW
GetUrlCacheGroupAttributeW
InternetOpenW
HttpSendRequestExA
InternetConfirmZoneCrossingA
GetUrlCacheEntryInfoExW
InternetGoOnlineA
comdlg32
PageSetupDlgA
ChooseColorW
GetOpenFileNameW
GetSaveFileNameW
ChooseFontA
PageSetupDlgW
ReplaceTextA
ReplaceTextW
LoadAlterBitmap
GetSaveFileNameA
GetFileTitleW
ChooseColorA
ChooseFontW
PrintDlgA
FindTextW
gdi32
DeleteColorSpace
TranslateCharsetInfo
GetBitmapDimensionEx
PolyTextOutW
GdiGetBatchLimit
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 277KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ