Static task
static1
Behavioral task
behavioral1
Sample
0c379a0ef79412adaa11dedeaecedd33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c379a0ef79412adaa11dedeaecedd33.exe
Resource
win10v2004-20231215-en
General
-
Target
0c379a0ef79412adaa11dedeaecedd33
-
Size
717KB
-
MD5
0c379a0ef79412adaa11dedeaecedd33
-
SHA1
f3de93623633e8574da8cd6afd5bed136de66494
-
SHA256
1ce959c67d42ec5d51f0c5e26be9967a048857d8d44a9ea9d97b7048e748f494
-
SHA512
31a080eb921a3710df0d643b3dceee05c1a09cce78fd0d01fee1b4660ecb7e3f603904080bcfcc04061d2d92c6beb7796b02ce0ec393190bd9051caae0197448
-
SSDEEP
12288:PKnekrL58fP6HRByvb1Ym2eyMitM7r/LYabh2rUx7tXTnaRy8cG1r8vZmsBxgrQ:kLiX6HyDGqc80YaNcm8vZvBGQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c379a0ef79412adaa11dedeaecedd33
Files
-
0c379a0ef79412adaa11dedeaecedd33.exe windows:5 windows
fbc78b2fcb37b8dfb189e821f7f5af5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CloseHandle
CreateFileA
GetFileSize
MapViewOfFile
UnmapViewOfFile
WriteFile
SetLastError
CreateFileMappingA
GetModuleFileNameA
GetModuleHandleA
DeleteFileA
MoveFileExA
CreateProcessW
SystemTimeToFileTime
WaitForSingleObject
TerminateProcess
GetLocalTime
GetTempPathA
GetFullPathNameA
GetThreadContext
GetCurrentThread
IsBadReadPtr
ExpandEnvironmentStringsA
WideCharToMultiByte
GetFileAttributesA
GetEnvironmentVariableA
MultiByteToWideChar
CreateDirectoryA
FindFirstFileA
GetProcAddress
RemoveDirectoryA
FindClose
LoadLibraryA
GetCurrentDirectoryA
GetCurrentProcessId
GetVolumeInformationW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
GetExitCodeProcess
VirtualFree
HeapFree
HeapAlloc
GetCurrentThreadId
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapCreate
HeapReAlloc
GetModuleHandleW
Sleep
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
RtlUnwind
SetHandleCount
GetFileType
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
VirtualQuery
advapi32
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExW
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ