Static task
static1
Behavioral task
behavioral1
Sample
0a0b272f26d5542d5c60013ddb3651f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a0b272f26d5542d5c60013ddb3651f2.exe
Resource
win10v2004-20231215-en
General
-
Target
0a0b272f26d5542d5c60013ddb3651f2
-
Size
422KB
-
MD5
0a0b272f26d5542d5c60013ddb3651f2
-
SHA1
4ec2b486804fd7aa78110b217b96e78341ab9670
-
SHA256
90e12fa61782caee3be2c2625e3559eeebc691fd395279f8ee2b13ee2c0e73ba
-
SHA512
33a67609201aa49888a1fa414d31fdab189b30f0638e974905511a3d9dd70fbbd20bac437fcd147e7eecf0cfc038c218e5be6726832b89a805226a15b8c904f0
-
SSDEEP
12288:qWNziYgBAV/X/bDoZAJwzGMy2ka0ONXdA1606:XziYga/vbqIwzGtONK4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a0b272f26d5542d5c60013ddb3651f2
Files
-
0a0b272f26d5542d5c60013ddb3651f2.exe windows:4 windows x86 arch:x86
b7ec4ea393cd9bd5c656e0a36c4a8d2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
IsBadCodePtr
VirtualFree
SetConsoleTitleA
lstrlenA
GetNumberFormatA
EnumResourceTypesA
GlobalAddAtomA
SignalObjectAndWait
GetDriveTypeA
GetDiskFreeSpaceExW
UpdateResourceW
GetLongPathNameW
FlushViewOfFile
WaitNamedPipeA
Sleep
SetConsoleActiveScreenBuffer
LoadLibraryExA
QueryPerformanceCounter
CallNamedPipeA
MoveFileA
GetStartupInfoA
LeaveCriticalSection
lstrcmpW
lstrcmpiW
GetLocaleInfoA
GetOEMCP
GetModuleFileNameW
GetPrivateProfileStructA
ReadConsoleInputW
GetCurrentThreadId
GetSystemTime
InitializeCriticalSection
QueryInformationJobObject
VirtualAlloc
GetVersion
ReadFileScatter
SetConsoleCP
AddConsoleAliasW
GetModuleHandleA
lstrcatA
TerminateJobObject
comdlg32
ChooseColorA
msvcrt
fsetpos
_localtime64
_CIlog
_strtime
srand
iswdigit
_wsplitpath
sscanf
wcscpy
_mbcjistojms
_strnicmp
__p__mbcasemap
_futime64
_seterrormode
_fputwchar
_mbctohira
_ismbclegal
_wstat64
_setsystime
_spawnlpe
vprintf
_CIsqrt
puts
_wexeclpe
_adj_fdiv_m16i
rand
isalnum
_chsize
__RTtypeid
_access
_toupper
ferror
__p__wpgmptr
_ismbbgraph
_adj_fdivr_m16i
user32
CharLowerBuffA
GetCapture
DdeQueryStringW
CloseWindowStation
CopyAcceleratorTableA
BeginPaint
DdeKeepStringHandle
GetCaretBlinkTime
GetAsyncKeyState
ChangeDisplaySettingsExA
CharToOemA
FindWindowExA
GetDlgItemInt
EnumPropsExA
EnumWindows
ChildWindowFromPoint
DdeInitializeW
gdi32
PaintRgn
CreateEllipticRgn
GetTextCharset
GetCharABCWidthsW
GetCharacterPlacementA
SetColorSpace
GdiGetBatchLimit
GetCurrentObject
DeleteColorSpace
EqualRgn
GetViewportExtEx
GetROP2
GetPolyFillMode
GetTextCharacterExtra
GetViewportOrgEx
Sections
.text Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xxxht Size: 207KB - Virtual size: 429KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ltg Size: 206KB - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ