Static task
static1
Behavioral task
behavioral1
Sample
0d6a9419e9555cd2411b8a2a7ce17df5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d6a9419e9555cd2411b8a2a7ce17df5.exe
Resource
win10v2004-20231215-en
General
-
Target
0d6a9419e9555cd2411b8a2a7ce17df5
-
Size
52KB
-
MD5
0d6a9419e9555cd2411b8a2a7ce17df5
-
SHA1
1a175a648cab48d0aa88a7b4220d9d9ab792c791
-
SHA256
311cd556661845a9372af8c047f607dc5f01f63e08ebcb8f98d6376574a0af66
-
SHA512
2a6ee1a3f7846c6b1785e4ab0cab090fdb87d0ada353a96182ccd4e2ffb3dde6c2ab9382680c7c2ed2a52e0d56bcf8d90bf009d9f6b07e073002452a21608e6d
-
SSDEEP
1536:bDMPEzwFN+IRYVuFJFfodjk2qIOPnToIfmwCxP:3IRZOk24fTBfIx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d6a9419e9555cd2411b8a2a7ce17df5
Files
-
0d6a9419e9555cd2411b8a2a7ce17df5.exe windows:4 windows x86 arch:x86
b8217e79379e1b59cb899c75f18224a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncmp
memmove
strncpy
strlen
strcpy
strcmp
strcat
memcpy
malloc
free
kernel32
GetModuleHandleA
HeapCreate
SetConsoleCtrlHandler
GetTempFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
RemoveDirectoryA
HeapDestroy
ExitProcess
GetNativeSystemInfo
GetModuleHandleW
GetProcAddress
GetVersionExA
HeapAlloc
HeapFree
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
GetEnvironmentVariableA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetExitCodeProcess
GetCommandLineA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
DeleteFileA
GetTempPathA
LoadLibraryA
FreeLibrary
FindFirstFileA
GetLastError
FindClose
FindNextFileA
CreateDirectoryA
WriteFile
CreateFileA
SetFilePointer
GetFileSize
ReadFile
HeapReAlloc
user32
DefWindowProcA
DestroyWindow
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
UnregisterClassA
LoadIconA
LoadCursorA
RegisterClassExA
IsWindowEnabled
EnableWindow
GetSystemMetrics
CreateWindowExA
SetWindowLongA
SendMessageA
SetFocus
CreateAcceleratorTableA
SetForegroundWindow
BringWindowToTop
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
MessageBoxA
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
gdi32
GetStockObject
comctl32
InitCommonControlsEx
shell32
ShellExecuteExA
ole32
CoInitialize
shlwapi
PathRenameExtensionA
PathAddBackslashA
PathQuoteSpacesA
Sections
.code Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ