Static task
static1
Behavioral task
behavioral1
Sample
0b15950b188d5f3264c09e87e91ddd89.exe
Resource
win7-20231215-en
General
-
Target
0b15950b188d5f3264c09e87e91ddd89
-
Size
553KB
-
MD5
0b15950b188d5f3264c09e87e91ddd89
-
SHA1
9a99ea4d49b95506e44d07789ab4b2f2cba4105b
-
SHA256
622ae83090f580d5f8cda48df2a5e793d0dbad3b06e087e1fb89fa1f197c8bd5
-
SHA512
fc95aab3a4d4fb202135d886593553b6106c9e589182f0e36853bf0c82c4ac09869fcb4d22b9e0574b99ace42052e8a914338a8efc9d7ca9d353310fd21ef772
-
SSDEEP
12288:7aiavLk47MA7SdTbthlbWwcTwWnw/iBe6:7LA7SdTbtvWwUoiw6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b15950b188d5f3264c09e87e91ddd89
Files
-
0b15950b188d5f3264c09e87e91ddd89.exe windows:4 windows x86 arch:x86
e393bd65aac3f60cdd3074a8cc577c00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3573
ord491
ord768
ord1641
ord489
ord3626
ord2414
ord4258
ord6197
ord4710
ord4976
ord2864
ord2379
ord2754
ord5875
ord4478
ord6055
ord1776
ord5290
ord4837
ord3610
ord656
ord567
ord4275
ord3402
ord3721
ord795
ord1146
ord1168
ord2614
ord2764
ord926
ord536
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord699
ord686
ord692
ord397
ord384
ord2860
ord2096
ord6453
ord3803
ord2859
ord3619
ord4123
ord4188
ord2753
ord4124
ord2639
ord4284
ord955
ord640
ord6654
ord283
ord1640
ord323
ord3797
ord613
ord5789
ord289
ord3089
ord5981
ord5710
ord5593
ord3438
ord912
ord5280
ord3597
ord641
ord324
ord2302
ord4234
ord6215
ord6880
ord6199
ord2645
ord4476
ord4853
ord4376
ord4160
ord4400
ord3630
ord682
ord6242
ord3706
ord4133
ord4297
ord5788
ord472
ord5786
ord3571
ord755
ord2405
ord5785
ord470
ord2567
ord2862
ord4774
ord2582
ord3370
ord4402
ord3640
ord693
ord4243
ord6007
ord3286
ord3998
ord6376
ord3996
ord3301
ord3293
ord6905
ord6888
ord3910
ord6907
ord6883
ord541
ord3742
ord818
ord4396
ord3574
ord609
ord5781
ord3874
ord6241
ord4224
ord2452
ord3698
ord765
ord4083
ord2575
ord2642
ord3093
ord1783
ord3092
ord1908
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord771
ord1008
ord496
ord4259
ord6176
ord1768
ord4715
ord2863
ord4287
ord5850
ord2882
ord2646
ord6380
ord4278
ord6662
ord801
ord6143
ord1233
ord1871
ord2448
ord5834
ord2044
ord542
ord802
ord5601
ord6569
ord2827
ord2820
ord3811
ord665
ord1979
ord5442
ord5186
ord354
ord857
ord861
ord1572
ord2817
ord1175
ord2233
ord296
ord617
ord5222
ord5221
ord5219
ord3584
ord3643
ord696
ord543
ord394
ord803
ord6418
ord2393
ord6307
ord909
ord4167
ord521
ord1263
ord5628
ord548
ord4185
ord1166
ord2763
ord6223
ord2919
ord6442
ord5590
ord3258
ord1265
ord6928
ord2055
ord2648
ord3579
ord5608
ord350
ord3613
ord3126
ord5651
ord3616
ord3127
ord743
ord446
ord4226
ord6467
ord2730
ord2727
ord2729
ord4003
ord290
ord614
ord3353
ord1799
ord4441
ord4835
ord3798
ord5287
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4854
ord4377
ord5265
ord4358
ord4948
ord4742
ord4905
ord5160
ord5162
ord5161
ord1907
ord5683
ord4129
ord6383
ord5440
ord2107
ord6394
ord5450
ord2841
ord6876
ord922
ord1187
ord6877
ord538
ord4204
ord6282
ord6283
ord939
ord3663
ord858
ord941
ord1134
ord2621
ord924
ord5214
ord3401
ord3953
ord2725
ord561
ord823
ord815
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord2818
ord860
ord2915
ord5572
ord537
ord4202
ord540
ord535
ord800
ord6696
ord825
ord1576
msvcrt
__set_app_type
_except_handler3
__p__commode
__p__fmode
_setmbcp
fgetc
calloc
_iob
fputc
malloc
realloc
free
_stricmp
__CxxFrameHandler
_purecall
_mbscmp
__p___argv
__p___argc
memset
_mbsicmp
memcpy
memcmp
strncpy
_ftol
abs
strchr
strlen
memmove
__RTDynamicCast
atoi
_mbsnbcpy
strtoul
strcat
strcpy
_splitpath
sprintf
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_mbsstr
_beginthreadex
atol
srand
rand
time
_controlfp
kernel32
WideCharToMultiByte
MultiByteToWideChar
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
ReadFile
CreateProcessA
GetStdHandle
CreatePipe
GetCurrentProcess
DuplicateHandle
GetProcAddress
FreeLibrary
LoadLibraryA
GetVersionExA
lstrcpyA
lstrcpynA
GetFileAttributesExA
GetModuleFileNameA
GetLastError
GetModuleHandleA
QueryPerformanceFrequency
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Sleep
GetWindowsDirectoryA
lstrlenA
OpenMutexA
CreateMutexA
WaitForSingleObject
CloseHandle
ReleaseMutex
CreateFileMappingA
lstrcatA
GetShortPathNameA
MoveFileExA
GetStartupInfoA
SetWaitableTimer
CreateWaitableTimerA
WritePrivateProfileStringA
GetComputerNameA
GetFileSize
CreateFileA
GetCurrentProcessId
WriteFile
SetFilePointer
lstrcmpiA
OpenProcess
TerminateProcess
CreateEventA
SetEvent
CreateDirectoryA
ResetEvent
HeapFree
GetProcessHeap
HeapAlloc
SetEndOfFile
GlobalFree
SetThreadPriority
TerminateThread
WaitForMultipleObjects
GetTempPathA
SetFileAttributesA
CopyFileA
QueryPerformanceCounter
MapViewOfFile
GetTempFileNameA
lstrlenW
UnmapViewOfFile
user32
DispatchMessageA
SetTimer
RedrawWindow
RegisterWindowMessageA
TranslateMessage
GetParent
GetClientRect
EnableWindow
LoadCursorA
KillTimer
GetMessageA
ScreenToClient
DestroyWindow
CreateWindowExA
FindWindowA
GetDesktopWindow
GetWindowRect
GetMessagePos
ShowCursor
SetCursor
GetSysColor
LoadImageA
ReleaseDC
GetDC
DrawFocusRect
OffsetRect
SetRect
CopyRect
SendMessageA
DestroyIcon
wsprintfA
PtInRect
DrawStateA
InvalidateRect
FillRect
LoadIconA
GetCursorPos
IsWindow
ClientToScreen
PostMessageA
LoadBitmapA
GetKeyState
InsertMenuA
GetSystemMenu
GetWindowLongA
AdjustWindowRectEx
gdi32
CreateCompatibleBitmap
BitBlt
CreateRectRgnIndirect
GetTextExtentPoint32A
GetTextMetricsA
CreateCompatibleDC
GetCurrentObject
CreateFontIndirectA
GetObjectA
DeleteObject
GetStockObject
CreateSolidBrush
CreateRoundRectRgn
advapi32
RegCloseKey
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Shell_NotifyIconA
comctl32
ImageList_Draw
ImageList_AddMasked
ImageList_GetImageInfo
_TrackMouseEvent
ImageList_GetImageCount
ImageList_GetIcon
ImageList_GetIconSize
ImageList_Remove
ole32
CoCreateInstance
CoInitialize
CoTaskMemAlloc
StgCreateDocfile
StgOpenStorage
CoCreateGuid
CoFreeLibrary
CoLoadLibrary
CoTaskMemFree
CoUninitialize
oleaut32
VariantClear
wininet
InternetSetStatusCallback
InternetOpenA
InternetCloseHandle
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpAddRequestHeadersA
HttpQueryInfoA
InternetErrorDlg
InternetQueryOptionA
InternetReadFileExA
netapi32
Netbios
ws2_32
ntohl
inet_addr
WSACleanup
inet_ntoa
gethostbyname
WSAStartup
htons
gethostname
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE