Static task
static1
Behavioral task
behavioral1
Sample
0b9f7cb34463247c9afe20b9e6d727f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b9f7cb34463247c9afe20b9e6d727f9.exe
Resource
win10v2004-20231222-en
General
-
Target
0b9f7cb34463247c9afe20b9e6d727f9
-
Size
630KB
-
MD5
0b9f7cb34463247c9afe20b9e6d727f9
-
SHA1
71b518ba2c5a79693004bfc64415d4b527cb3cdc
-
SHA256
767b7cf99beb2cd915c70df9ca91865da6646282a2469ce91b768160f2d9b843
-
SHA512
d5a7a3ee62e60794c950a2b357fe2762233f0a0eb54199c4cf7b683ffd0331e1b203042b1189671cf0d99ad6158ff1342153592d0bb9dac780e627ce9ef8e2f2
-
SSDEEP
12288:ZhFzIrU3QxTCZmYCoF9lK76GL7AhQyM6Z0LG+VennkzHum:ZhFkrUhnsxL7AhQ6Z0L9gnkDum
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b9f7cb34463247c9afe20b9e6d727f9
Files
-
0b9f7cb34463247c9afe20b9e6d727f9.exe windows:4 windows x86 arch:x86
1b7d6d217cf8ac35456921609f6c2f2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetInstanceExplorer
ExtractIconA
comctl32
CreateStatusWindow
CreatePropertySheetPageW
CreateStatusWindowA
InitCommonControlsEx
comdlg32
GetSaveFileNameW
FindTextW
GetFileTitleW
ReplaceTextW
gdi32
EndPage
SetMiterLimit
EnumMetaFile
OffsetWindowOrgEx
wininet
InternetAlgIdToStringA
user32
TrackMouseEvent
GetClassInfoA
PostMessageW
RegisterClassExA
ShowWindow
GetWindowWord
RegisterClassA
SendIMEMessageExA
GetDlgItemTextA
MessageBoxW
GetClassInfoExA
GetWindowLongA
GetNextDlgTabItem
LoadBitmapA
GetThreadDesktop
UnhookWinEvent
SetMessageExtraInfo
FillRect
LoadCursorW
GetCaretBlinkTime
RegisterDeviceNotificationW
VkKeyScanExA
EnumWindowStationsA
GetDesktopWindow
DdeConnectList
DispatchMessageA
DefWindowProcW
MessageBoxExA
WinHelpA
CharToOemBuffW
GetKeyboardLayoutNameA
DestroyWindow
PaintDesktop
DrawTextExA
GetKeyNameTextW
IsCharUpperA
CharNextA
GetUpdateRgn
FrameRect
MapVirtualKeyA
LoadStringA
SetWindowWord
DialogBoxParamA
LoadKeyboardLayoutW
CheckDlgButton
ReleaseDC
MsgWaitForMultipleObjectsEx
VkKeyScanA
IsRectEmpty
SetClipboardData
ValidateRect
CreateDialogIndirectParamA
CreateWindowExA
CharToOemA
CallWindowProcA
DragObject
EnumDesktopsA
UnregisterDeviceNotification
GetUserObjectSecurity
ReplyMessage
DrawTextW
DdeReconnect
SetScrollInfo
CloseDesktop
IsMenu
SetCaretPos
SetMenuItemInfoA
kernel32
UnlockFileEx
UnhandledExceptionFilter
GetEnvironmentStringsW
CompareStringW
GetStringTypeA
CompareStringA
FlushFileBuffers
WritePrivateProfileSectionA
HeapCreate
GetSystemTime
LCMapStringW
SystemTimeToTzSpecificLocalTime
GetCurrentThreadId
CloseHandle
InterlockedIncrement
ReadFile
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetCPInfo
GetCurrentProcessId
WideCharToMultiByte
ExitProcess
FreeEnvironmentStringsW
GetStringTypeW
GetCommandLineA
CreateToolhelp32Snapshot
GetCommandLineW
DeleteCriticalSection
SetLastError
TlsFree
OpenMutexA
QueryPerformanceCounter
TlsGetValue
HeapDestroy
TerminateProcess
CreateMutexA
VirtualQuery
GetFileType
TlsAlloc
GetModuleFileNameA
FreeEnvironmentStringsA
WriteFile
SetStdHandle
GetPrivateProfileSectionA
VirtualFree
GetWindowsDirectoryW
GetProcAddress
HeapAlloc
SetEnvironmentVariableA
LCMapStringA
GetCurrentThread
LeaveCriticalSection
MultiByteToWideChar
InterlockedExchange
SetHandleCount
VirtualAlloc
HeapFree
GetVersion
GetEnvironmentStrings
SetFilePointer
GetSystemTimeAsFileTime
MapViewOfFile
HeapReAlloc
CreateMutexW
IsBadWritePtr
GetModuleHandleA
GetStartupInfoW
GetTickCount
InitializeCriticalSection
GetTimeZoneInformation
GetLastError
GetCurrentProcess
GetStdHandle
InterlockedDecrement
GetLocalTime
WritePrivateProfileStructA
GetModuleFileNameW
TlsSetValue
EnterCriticalSection
Sections
.text Size: 189KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 251KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ