Static task
static1
Behavioral task
behavioral1
Sample
0ac14e428bd8c13567c98c08db068486.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ac14e428bd8c13567c98c08db068486.exe
Resource
win10v2004-20231215-en
General
-
Target
0ac14e428bd8c13567c98c08db068486
-
Size
368KB
-
MD5
0ac14e428bd8c13567c98c08db068486
-
SHA1
007dfc4a4a2cb8d2ba7af39b2c528d18e9beae3c
-
SHA256
38a69239ca1c548997c22300cf70456c2bdfba4570aa3c97faefd268245d6b40
-
SHA512
23a3fe53dc081ae82e88217423a82bd3c8c1e015ff23aef7b2ae3e900714c5a302d8b57d813a60ff1e9c02ab75e66ade87fa75a05b2c5a1290e156272ae2226a
-
SSDEEP
6144:krVHwoy8GhMG+Wa/irQpswLTstL2xwDMQQZ8qCIPc457BwAGPrQe+j/rfBFnG7X4:O2RMGVa/uQiWg2+YR8P74573nBT3A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ac14e428bd8c13567c98c08db068486
Files
-
0ac14e428bd8c13567c98c08db068486.exe windows:4 windows x86 arch:x86
baac45662818e9b5cc9f0ff417e0576f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleOutputCP
WriteConsoleOutputW
_lclose
ExitProcess
WriteConsoleOutputCharacterA
FindFirstFileExW
IsBadWritePtr
VirtualLock
GetDiskFreeSpaceW
EnumDateFormatsW
RemoveDirectoryA
SetMailslotInfo
SetEvent
CreateNamedPipeW
PurgeComm
OutputDebugStringA
SetupComm
SetVolumeLabelA
QueryDosDeviceA
GetFileInformationByHandle
VirtualQueryEx
FreeEnvironmentStringsA
GetShortPathNameW
GetStartupInfoA
TlsGetValue
GetVolumeInformationW
GetPrivateProfileSectionW
GetAtomNameA
GetModuleHandleA
_llseek
GlobalFindAtomW
FormatMessageW
LocalSize
GlobalAddAtomW
GetUserDefaultLCID
DebugBreak
SetHandleCount
GetCommandLineA
GetVersionExA
VirtualProtect
LocalAlloc
GlobalUnlock
GetDriveTypeA
IsBadReadPtr
SizeofResource
DeleteCriticalSection
FreeLibraryAndExitThread
CopyFileExW
GetCompressedFileSizeW
LoadLibraryExA
_lread
VirtualAllocEx
EnumResourceNamesA
GetProfileIntA
GetFileType
lstrlenA
user32
ArrangeIconicWindows
DrawTextExW
CharPrevW
SetMenuInfo
SetParent
GetDoubleClickTime
EndDialog
DrawIconEx
GetDlgItemTextA
DialogBoxParamW
CreatePopupMenu
InsertMenuItemW
MessageBeep
IsCharLowerA
SetDlgItemTextW
FlashWindow
GetKeyboardState
DrawIcon
MonitorFromPoint
GetClassInfoW
LoadImageA
RegisterWindowMessageW
SetWindowWord
FlashWindowEx
SetWindowTextA
GetWindowTextLengthA
ChangeDisplaySettingsW
CharToOemBuffA
DestroyIcon
DefMDIChildProcW
MapVirtualKeyA
SendInput
DestroyAcceleratorTable
MessageBoxExA
KillTimer
CreateDesktopA
InsertMenuItemA
OpenWindowStationA
GetWindowRect
TranslateAcceleratorW
gdi32
EnumEnhMetaFile
SetSystemPaletteUse
CreateMetaFileW
SetDIBitsToDevice
GetOutlineTextMetricsA
GetTextCharsetInfo
GetDeviceCaps
SaveDC
SetGraphicsMode
SetViewportOrgEx
SetWindowOrgEx
SetDIBits
SetBitmapDimensionEx
GetCharWidth32W
SetBkColor
FillRgn
GetEnhMetaFileDescriptionA
StartPage
comdlg32
GetOpenFileNameW
PageSetupDlgA
ReplaceTextW
ChooseColorW
advapi32
RegDeleteKeyA
CloseServiceHandle
CryptEncrypt
GetFileSecurityW
RegUnLoadKeyW
RegDeleteValueA
GetServiceDisplayNameW
AbortSystemShutdownA
ReportEventA
IsValidSid
CryptAcquireContextW
RegEnumKeyExA
SetSecurityDescriptorOwner
RegQueryValueW
GetPrivateObjectSecurity
IsValidSecurityDescriptor
MapGenericMask
StartServiceW
RegisterEventSourceW
QueryServiceConfigA
CryptDecrypt
AddAccessDeniedAce
GetTokenInformation
RegOpenKeyExA
DeleteService
GetSidSubAuthority
RegRestoreKeyW
SetKernelObjectSecurity
RegSetValueExW
CreatePrivateObjectSecurity
RegCreateKeyExW
RegQueryValueExW
CryptDeriveKey
EqualSid
LookupPrivilegeDisplayNameA
BuildSecurityDescriptorW
AddAce
IsValidAcl
OpenServiceW
SetSecurityDescriptorSacl
ole32
StringFromGUID2
comctl32
ord17
shlwapi
StrCmpW
PathAppendA
PathRemoveBlanksA
AssocQueryKeyW
SHCreateStreamOnFileW
PathCommonPrefixW
setupapi
SetupDiGetDeviceInstallParamsW
Sections
.text Size: 332KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE