Static task
static1
Behavioral task
behavioral1
Sample
0d1130cdf64d7b3452b60f506fb43309.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d1130cdf64d7b3452b60f506fb43309.exe
Resource
win10v2004-20231215-en
General
-
Target
0d1130cdf64d7b3452b60f506fb43309
-
Size
262KB
-
MD5
0d1130cdf64d7b3452b60f506fb43309
-
SHA1
5dac44e254073e2b21bc08f7adfd397d64d5f444
-
SHA256
33beb8fff5ddee80088f4e7f4a4dd84aceceafd4eee5b1640dec7987c110e2bf
-
SHA512
f59e049e6d311391d13cafc92947a6996c5b9837a3476b1f80f1128870af4ea5f6d80b2fa1d215bfeff227cef47103ce3262538c129d89b98aca362683d3284a
-
SSDEEP
6144:SreHovwlyQclJ8I/sWv+WxSv34f+4cdSFqOo9eKu0dp:8eHoScL8jbWw3/4NFq7YWp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d1130cdf64d7b3452b60f506fb43309
Files
-
0d1130cdf64d7b3452b60f506fb43309.exe windows:4 windows x86 arch:x86
0a42e38b8e24e9e677985c24ff26d8db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemAlloc
OleRegEnumVerbs
CoCreateInstance
CreateDataAdviseHolder
OleLoadFromStream
CreateOleAdviseHolder
WriteClassStm
StringFromGUID2
OleRegGetMiscStatus
OleSaveToStream
CoTaskMemFree
OleRegGetUserType
CoTaskMemRealloc
gdi32
GetDeviceCaps
CreateRectRgnIndirect
CloseMetaFile
CreateMetaFileA
SaveDC
DeleteDC
SetWindowOrgEx
LPtoDP
SetWindowExtEx
SetTextAlign
TextOutA
SetMapMode
RestoreDC
DeleteMetaFile
SetViewportOrgEx
CreateDCA
kernel32
EnterCriticalSection
IsDebuggerPresent
VirtualAlloc
FreeEnvironmentStringsW
lstrcatA
GetSystemInfo
WriteConsoleA
FindResourceA
GetSystemTimeAsFileTime
GetOEMCP
SetFilePointer
GetThreadLocale
VirtualProtect
GetCurrentThreadId
TlsGetValue
GetTempPathA
RtlUnwind
SetFileAttributesA
GetConsoleCP
VirtualFree
GetProcessHeap
ReadFile
WaitForMultipleObjects
ReleaseMutex
CreateEventA
lstrlenW
TlsSetValue
WideCharToMultiByte
FlushInstructionCache
RaiseException
GetCommandLineA
HeapFree
DeleteFileA
LoadResource
lstrlenA
WaitForSingleObjectEx
SetLastError
GetTempPathW
FindFirstFileA
WritePrivateProfileStringA
GetConsoleMode
GetModuleHandleA
TlsAlloc
CreateDirectoryW
LoadLibraryExA
CloseHandle
FindNextFileA
HeapAlloc
CreateMutexW
GetLocalTime
OutputDebugStringA
GetConsoleOutputCP
TlsFree
HeapSize
lstrcpyA
FreeEnvironmentStringsA
CreateFileW
TerminateThread
lstrcmpA
lstrcmpiA
VirtualQuery
WaitForSingleObject
LCMapStringW
FlushFileBuffers
SetHandleCount
GetFileType
DeleteFileW
GlobalLock
GlobalUnlock
UnhandledExceptionFilter
FindClose
SizeofResource
CreateMutexA
IsDBCSLeadByte
GetACP
SetStdHandle
GetTempFileNameW
WriteConsoleW
GlobalAlloc
HeapReAlloc
LeaveCriticalSection
DeleteCriticalSection
IsProcessorFeaturePresent
WriteFile
LCMapStringA
GetStdHandle
SetUnhandledExceptionFilter
HeapDestroy
FreeLibrary
CreateThread
IsValidCodePage
CreateFileA
MulDiv
GetCurrentDirectoryW
oleaut32
RegisterTypeLi
VariantChangeType
SysAllocStringByteLen
VariantClear
SysStringLen
UnRegisterTypeLi
VariantInit
LoadTypeLi
SysAllocString
LoadRegTypeLi
OleCreatePropertyFrame
VariantCopy
SysStringByteLen
SysFreeString
VarUI4FromStr
DispCallFunc
user32
ShowWindow
DefWindowProcA
SetWindowRgn
CharNextA
SetWindowPos
UnionRect
GetFocus
wsprintfA
LoadCursorA
DestroyWindow
IntersectRect
GetClientRect
IsWindow
CallWindowProcA
EqualRect
IsChild
GetForegroundWindow
ReleaseDC
GetWindowLongA
MessageBoxA
GetKeyState
PtInRect
GetDC
SetCursor
SetWindowLongA
InvalidateRect
UnregisterClassA
GetParent
OffsetRect
SetFocus
advapi32
RegDeleteValueA
RegOpenKeyExA
RegOpenCurrentUser
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
userenv
GetProfileType
FreeGPOListW
RsopLoggingEnabled
ExpandEnvironmentStringsForUserW
GetUserProfileDirectoryW
DllUnregisterServer
themeui
DllInstall
Sections
.EQoGWOD Size: 2KB - Virtual size: 33KB
IMAGE_SCN_MEM_READ
.APlNwFA Size: 512B - Virtual size: 38KB
IMAGE_SCN_MEM_READ
.UjadMzW Size: 2KB - Virtual size: 12KB
IMAGE_SCN_MEM_READ
.BFOnDOK Size: 2KB - Virtual size: 26KB
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.FpfaQT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CVArTC Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zplX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RNgmz Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nVsOR Size: 1024B - Virtual size: 861B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HPJFZ Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.QuXpmhS Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE