Static task
static1
Behavioral task
behavioral1
Sample
0d1fb9dcac4317f7ad506b2a4f27f4d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d1fb9dcac4317f7ad506b2a4f27f4d3.exe
Resource
win10v2004-20231222-en
General
-
Target
0d1fb9dcac4317f7ad506b2a4f27f4d3
-
Size
30KB
-
MD5
0d1fb9dcac4317f7ad506b2a4f27f4d3
-
SHA1
e2c28fc6de44b9de7e950894e84fc9c8754b5c38
-
SHA256
03ca5a0edc5fb435e79b2c782b158767f67ebfefbd03cde1154149872fcbb32a
-
SHA512
7a837fbc66dc0f04816b88a5528d6bf9c6cd14b3dd9870b26c71bb6c1b3bc92c56346c0c41608c479a6bdd783cffcc871979869c04e3d257bc95257fc217b02d
-
SSDEEP
768:hzI38Wrb+0mgQ/NICrLK4KgN1ANKCueXO0MV:ypPj8NXLvKgBwI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d1fb9dcac4317f7ad506b2a4f27f4d3
Files
-
0d1fb9dcac4317f7ad506b2a4f27f4d3.exe windows:4 windows x86 arch:x86
9e1feca6d664f734366ba54cfbeda783
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
kernel32
AllocConsole
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCurrentProcessId
GetDriveTypeA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
MoveFileA
OpenProcess
Process32First
Process32Next
ReadFile
RemoveDirectoryA
SetFilePointer
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_winmajor
abort
atexit
atoi
calloc
exit
fclose
fopen
fputc
fputs
free
fwrite
memcpy
memset
rand
signal
sprintf
srand
strcat
strcmp
strcpy
strlen
strncat
strncmp
strstr
strtok
vfprintf
shell32
ShellExecuteA
user32
CharUpperBuffA
FindWindowA
ShowWindow
wsprintfA
wininet
InternetGetConnectedState
ws2_32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
getsockname
htonl
htons
inet_addr
inet_ntoa
listen
ntohs
recv
select
send
socket
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 33KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE