Static task
static1
Behavioral task
behavioral1
Sample
0b2ec09baa43cd37ddf794a863858905.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b2ec09baa43cd37ddf794a863858905.exe
Resource
win10v2004-20231215-en
General
-
Target
0b2ec09baa43cd37ddf794a863858905
-
Size
24KB
-
MD5
0b2ec09baa43cd37ddf794a863858905
-
SHA1
b978fe81b08aabbe680b436a7e4229e20d61a46c
-
SHA256
c45c960b02d5c636d5d0cb4e750c289f3346b6b0c48f0e3c886ded1f126b02aa
-
SHA512
63c8937e71a0ddcf82ab27ebb08a7f5b84e03c026b8bb4beaacbdd6342d8c9fab4d00d41b4d9554b39db8df7312a9a649c61ea2f0f141dc273bb7f1a340378bf
-
SSDEEP
768:K+Bwje0v4Cw+uQDoaAXtjaLacmkLGKddm:Kwgv4CwIoaAXJaLaSLGydm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b2ec09baa43cd37ddf794a863858905
Files
-
0b2ec09baa43cd37ddf794a863858905.exe windows:4 windows x86 arch:x86
fbea968907b0cce9de4993f692c2c4b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
MapViewOfFile
CreateFileMappingA
GetFileSize
UnmapViewOfFile
WinExec
GetTempFileNameA
GetTempPathA
Sleep
CreateFileA
GetProcAddress
LoadLibraryA
GetPrivateProfileStringA
ExitProcess
WritePrivateProfileStringA
GetModuleFileNameA
GetWindowsDirectoryA
FreeLibrary
GetLastError
DuplicateHandle
GetCurrentProcess
GetSystemDirectoryA
CloseHandle
LCMapStringA
WideCharToMultiByte
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringW
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shlwapi
PathAppendA
Sections
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ