Static task
static1
Behavioral task
behavioral1
Sample
0e927810c318d111816bccda18ad44de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e927810c318d111816bccda18ad44de.exe
Resource
win10v2004-20231215-en
General
-
Target
0e927810c318d111816bccda18ad44de
-
Size
41KB
-
MD5
0e927810c318d111816bccda18ad44de
-
SHA1
7efaa2e158c79648676cc185cb587d0c04076886
-
SHA256
bdfb5e34f17eb77ed2f197bc361f010941aff90436acf2b589164f38ffa6390e
-
SHA512
55c2a2e3ed1180a01ebdf510c83309b4f5f52caba05b9b59c273a21ceaa25e1ef8f3bf25a40e449e6ec670032889fc4d04b9a5d702d78582358962f37039a5d5
-
SSDEEP
768:+dpgLHmTiqViOf0f3R9nqRKpdzqf2HqBsF0PeRD8HR2tREw:0pgLvqVLI3R9nlqf2usCPo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e927810c318d111816bccda18ad44de
Files
-
0e927810c318d111816bccda18ad44de.exe windows:4 windows x86 arch:x86
f8f801a722b6f80b496c337f5bcc9de2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBW
CopyFileExA
CreateProcessW
EnumResourceLanguagesA
ExitProcess
GetBinaryType
GetCommProperties
GetCommandLineW
GetConsoleTitleA
GetPrivateProfileSectionNamesA
PeekConsoleInputA
RequestWakeupLatency
SetCurrentDirectoryW
WaitNamedPipeW
WideCharToMultiByte
advapi32
AbortSystemShutdownA
BuildSecurityDescriptorA
CryptGenKey
EnumDependentServicesA
EnumDependentServicesW
GetExplicitEntriesFromAclA
GetSecurityDescriptorOwner
GetUserNameA
LookupAccountSidA
ObjectDeleteAuditAlarmA
QueryServiceLockStatusA
RegOpenKeyW
user32
ChangeDisplaySettingsA
DdeGetData
DrawCaptionTempW
DrawIcon
DrawStateW
GetAncestor
GetMenuItemID
GetMenuStringA
InSendMessage
LockWindowUpdate
OpenDesktopA
RegisterClassW
RemoveMenu
SetDeskWallpaper
SetParent
VkKeyScanA
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE