Static task
static1
Behavioral task
behavioral1
Sample
0ddb6ac5136ea17c3f5ac99e2a7ce46a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ddb6ac5136ea17c3f5ac99e2a7ce46a.exe
Resource
win10v2004-20231215-en
General
-
Target
0ddb6ac5136ea17c3f5ac99e2a7ce46a
-
Size
281KB
-
MD5
0ddb6ac5136ea17c3f5ac99e2a7ce46a
-
SHA1
1aded4c904f5ef368f7f71b43885f6e8a9426337
-
SHA256
9a4a72b4412e44d0562f34ab70992fbeb5eaf8c2ef8d60f33c8487b59eab075e
-
SHA512
236a59995f5c2070076ae6df2170dd5d6c3b585c02c45f3633da85e870e043d222b1242fc4e0655c44bcc59dd98ae60e4eaaa973499ae9d7e6f385d9d0875e57
-
SSDEEP
6144:IBkiPx3D5Iibc/POOOOtOOOOOOOOOOOOOOOOOOOO+OOOOOOOOOOOOOOOOOOOOmOy:IBki154nOOOOtOOOOOOOOOOOOOOOOOOd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ddb6ac5136ea17c3f5ac99e2a7ce46a
Files
-
0ddb6ac5136ea17c3f5ac99e2a7ce46a.exe windows:5 windows x86 arch:x86
3b525d5bdb91f3827ac5843b7c851ed1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
AssocQueryStringA
wnsprintfA
StrNCatA
SHDeleteKeyA
StrToIntA
StrStrIA
userenv
GetProfilesDirectoryA
kernel32
GetTempPathA
DeleteFileA
lstrcpyA
SetFilePointer
SetEndOfFile
HeapFree
GetCurrentProcess
GetVersionExA
Sleep
GetModuleHandleA
GetVolumeInformationA
LocalFree
lstrcmpA
ExpandEnvironmentStringsA
OpenProcess
GlobalAlloc
GlobalFree
ExitProcess
SetErrorMode
GetTickCount
CreateThread
MultiByteToWideChar
SetLastError
GetSystemTimeAsFileTime
CloseHandle
InitializeCriticalSectionAndSpinCount
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
RtlUnwind
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FindNextFileA
GetModuleFileNameA
LoadLibraryA
FindClose
RemoveDirectoryA
GetProcAddress
lstrcmpiA
GetLastError
VirtualQuery
FindFirstFileA
lstrcatA
ReadFile
CreateProcessA
GetFileAttributesA
WriteFile
GetProcessHeap
HeapAlloc
FreeLibrary
MoveFileExA
lstrlenA
GetFileSize
CreateFileA
lstrcpynA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
RaiseException
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
user32
RegisterClassExA
PostQuitMessage
SendDlgItemMessageA
FillRect
LoadBitmapA
LoadIconA
SendMessageA
BeginPaint
IsDialogMessageA
GetWindowRect
MessageBoxA
GetWindowLongA
CreateWindowExA
GetDlgItem
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
AdjustWindowRectEx
SystemParametersInfoA
SetWindowTextA
UpdateWindow
LoadCursorA
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
ExitWindowsEx
EndPaint
GetMessageA
DestroyWindow
TranslateMessage
gdi32
BitBlt
GetTextExtentPoint32A
SetTextColor
CreateFontA
SetBkMode
SelectObject
CreateCompatibleDC
GetObjectA
GetStockObject
CreateSolidBrush
TextOutA
DeleteDC
advapi32
AdjustTokenPrivileges
IsValidSid
GetSecurityDescriptorOwner
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
RegEnumValueA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyA
OpenProcessToken
GetUserNameA
RegCreateKeyA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHFileOperationA
ShellExecuteA
SHGetFolderPathA
ord680
ShellExecuteExA
Sections
CODE Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ