Static task
static1
Behavioral task
behavioral1
Sample
0a36e9837d756030cd6c96bec87e4e8d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a36e9837d756030cd6c96bec87e4e8d.exe
Resource
win10v2004-20231215-en
General
-
Target
0a36e9837d756030cd6c96bec87e4e8d
-
Size
411KB
-
MD5
0a36e9837d756030cd6c96bec87e4e8d
-
SHA1
a742e4da1e41612d0f96d96072bace81224ea8b3
-
SHA256
f8e4f47e69e5c3570620a1203188cd3d34a42ca723d477b999fc680e2ec12440
-
SHA512
6458e1fe701e223cfcf3e6dede2f9f561463b45df82b178c73a95d56fe68b90a1e51693ceb204b4e7705ce27663690f8345873785b315eac18bfce8ee52ff7b7
-
SSDEEP
12288:rnsjIk+xuERVpOCfJpHOJWSSU6StxQcO2N:CL+9xvHzQPQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a36e9837d756030cd6c96bec87e4e8d
Files
-
0a36e9837d756030cd6c96bec87e4e8d.exe windows:4 windows x86 arch:x86
c3c8bd645e2331c680e559d06b994717
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetOEMCP
HeapLock
GetConsoleTitleA
GetEnvironmentStrings
MoveFileW
HeapAlloc
VirtualProtect
SetEnvironmentVariableA
InitializeCriticalSection
TlsFree
SuspendThread
IsBadReadPtr
CompareStringA
LeaveCriticalSection
MultiByteToWideChar
GlobalReAlloc
GetLocaleInfoA
GetLocaleInfoW
AddAtomW
LCMapStringA
EnumSystemLocalesA
GetModuleFileNameW
FreeEnvironmentStringsA
LoadLibraryExA
GetStdHandle
TlsAlloc
GetFileType
GetProcAddress
ExpandEnvironmentStringsA
GetEnvironmentStringsW
UnhandledExceptionFilter
DeleteAtom
EnterCriticalSection
GetLongPathNameW
GetStringTypeA
VirtualQuery
HeapSize
TlsSetValue
IsValidCodePage
CompareFileTime
GetSystemInfo
SetHandleCount
GetDateFormatA
HeapReAlloc
HeapDestroy
ExitProcess
EnumTimeFormatsW
MapViewOfFile
VirtualAlloc
VirtualFree
QueryPerformanceCounter
GetCurrentProcess
GetUserDefaultLCID
GetModuleHandleA
GetCPInfo
GetTimeFormatA
GetTimeZoneInformation
GetCurrentThreadId
IsValidLocale
WriteFile
DeleteCriticalSection
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
GetVersionExA
CompareStringW
SetLastError
GetTickCount
GetStartupInfoW
SetWaitableTimer
GetACP
LCMapStringW
IsBadWritePtr
RtlUnwind
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
InterlockedExchange
HeapCreate
WriteConsoleOutputW
EnumResourceNamesA
GetCommandLineW
WideCharToMultiByte
GetStartupInfoA
GetStringTypeW
HeapFree
TerminateProcess
LoadLibraryA
GetCurrentThread
TlsGetValue
shell32
DragQueryPoint
SHChangeNotify
RealShellExecuteA
SHGetDataFromIDListA
DragAcceptFiles
SHGetSpecialFolderPathW
ExtractAssociatedIconExA
DragQueryFileW
SHFileOperation
SHAddToRecentDocs
SHGetNewLinkInfo
ExtractIconA
ExtractIconW
SHFreeNameMappings
gdi32
ExtFloodFill
GetKerningPairs
SetTextColor
CreateMetaFileA
GetCharacterPlacementA
AddFontResourceA
RoundRect
SetDIBColorTable
SelectClipRgn
GetClipRgn
PolyBezier
AddFontResourceW
GetLogColorSpaceA
GetPaletteEntries
CreateFontW
GetEnhMetaFileBits
comdlg32
ChooseFontA
PageSetupDlgW
GetOpenFileNameA
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 271KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ