Static task
static1
Behavioral task
behavioral1
Sample
0b166119ed03da41bfc77a52e7c2a32a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b166119ed03da41bfc77a52e7c2a32a.exe
Resource
win10v2004-20231215-en
General
-
Target
0b166119ed03da41bfc77a52e7c2a32a
-
Size
41KB
-
MD5
0b166119ed03da41bfc77a52e7c2a32a
-
SHA1
d44ba7eba9de4a6b3c87e359ad5d27609c4a8a24
-
SHA256
9082904fbafe2368e4361ac4a323665e83e2030d7c6dd2c5cabb026050cd2efe
-
SHA512
c862078bdf472e8737dc31c96f5121616d61014f0e04ac98c39414926a1e153fe3cbc9a052518327fededb6c9dfd141bc0b15693ec857d51a1125938699bfc0b
-
SSDEEP
768:GMLb44GzWmWtgUU/RS+vrIEce/3wx+nhCNDoSKXiAd:GAd4lUU/E+v0EcevwXNkv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b166119ed03da41bfc77a52e7c2a32a
Files
-
0b166119ed03da41bfc77a52e7c2a32a.exe windows:4 windows x86 arch:x86
58205992140e503ae51d255d5ed76872
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
OutputDebugStringA
FindNextVolumeW
LocalLock
ReadConsoleA
TlsSetValue
VirtualProtectEx
ContinueDebugEvent
FreeEnvironmentStringsA
GetCurrentProcess
GetCurrentConsoleFont
LoadLibraryA
OpenProfileUserMapping
LoadLibraryExA
lstrcpy
GetThreadLocale
GetConsoleCursorMode
DebugBreak
IsBadWritePtr
CreateTimerQueueTimer
UnregisterConsoleIME
GetProcAddress
GetConsoleFontInfo
GetCommTimeouts
GetConsoleAliasExesW
GetConsoleNlsMode
lstrcmpA
GetSystemDefaultLangID
GlobalUnlock
GetConsoleKeyboardLayoutNameA
GetProcessVersion
user32
SetCapture
Sections
.text Size: 5KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE