Static task
static1
Behavioral task
behavioral1
Sample
0e82afe633eb03634bf2f708a1df4d8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e82afe633eb03634bf2f708a1df4d8b.exe
Resource
win10v2004-20231215-en
General
-
Target
0e82afe633eb03634bf2f708a1df4d8b
-
Size
548KB
-
MD5
0e82afe633eb03634bf2f708a1df4d8b
-
SHA1
99ab62a629814c0f809c953b336998787c2e82e8
-
SHA256
e0e44257eae8006e568bad7c74fd5c65666c15a5db2c63710ca3f606a1c21b76
-
SHA512
b03c6df71b1c9a47b4b1bb3485ed3ca5773782045a763cc2f667ec581d2405cd244a4d165feab564bbca025aefbe1707293faecd137defe904ff582ff5f7bfa2
-
SSDEEP
6144:Q57GvhHZUyu2KEVwW/un5HVMy/IudUpHf/aM11Jm2o8IzP9f4Cpxv:IGvh5UCVwWs51xUp6UeHVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e82afe633eb03634bf2f708a1df4d8b
Files
-
0e82afe633eb03634bf2f708a1df4d8b.exe windows:4 windows x86 arch:x86
635c3f2e4e5b4f73b07328e0c70dbdb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateEventA
Module32Next
Module32First
LocalFree
CreateMutexA
OpenMutexA
LoadLibraryA
GetProcAddress
GetTickCount
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
FormatMessageA
WriteFile
RaiseException
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
ReadFile
GetFileSize
GetCurrentProcessId
CreateFileA
ResetEvent
GetCurrentProcess
DuplicateHandle
GetLastError
ResumeThread
SuspendThread
CreateProcessA
WriteProcessMemory
ReadProcessMemory
FindFirstFileA
FindClose
SetCurrentDirectoryA
GetModuleFileNameA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetEnvironmentStrings
WideCharToMultiByte
GetExitCodeProcess
OutputDebugStringA
OpenProcess
TerminateProcess
Sleep
SetFileAttributesA
FreeLibrary
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetFileAttributesA
CreateDirectoryA
GetVersion
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
RtlUnwind
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
LoadIconA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
LoadCursorA
SetCursor
SendMessageA
MessageBeep
GetWindowRect
IsWindowVisible
SetWindowTextA
ShowWindow
SetForegroundWindow
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
GetDesktopWindow
GetActiveWindow
MessageBoxA
PostMessageA
GetTabbedTextExtentA
GetDC
ReleaseDC
wsprintfA
GetWindowThreadProcessId
IsWindow
GetForegroundWindow
SendMessageTimeoutA
gdi32
CreatePen
Rectangle
CreateSolidBrush
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
CreateDIBSection
SetBkMode
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectA
advapi32
CryptVerifySignatureA
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptHashData
CryptDestroyHash
CryptImportKey
CryptDestroyKey
winmm
timeGetTime
imagehlp
ImageRvaToVa
UnMapAndLoad
MapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 307KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ