Static task
static1
Behavioral task
behavioral1
Sample
0e480c9f49199f9f7b42a954d5d50a43.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e480c9f49199f9f7b42a954d5d50a43.exe
Resource
win10v2004-20231215-en
General
-
Target
0e480c9f49199f9f7b42a954d5d50a43
-
Size
328KB
-
MD5
0e480c9f49199f9f7b42a954d5d50a43
-
SHA1
59d6c3bf4f65c9ad3ab66aeda540d0ded466cf08
-
SHA256
dd1398e732ef07a54ebe588abe40fc0069c9cd95e723d99ecfe725c43a9d1e51
-
SHA512
0f68d63801f95f7e9eeb919d003286baa5e6a346c2bdf8fe153ce9482557b3080983efc255c48f5ab76c1fe9559f560ef76c1494d781a02d06cabf2a25e91537
-
SSDEEP
6144:y9h7qduEIwqllG7sOC12C+g0PRToNvId32d9d:WwwXOnY0Z9N8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e480c9f49199f9f7b42a954d5d50a43
Files
-
0e480c9f49199f9f7b42a954d5d50a43.exe windows:4 windows x86 arch:x86
d3879bf2154d4bef8047cf4762271038
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
SetErrorMode
GetSystemTimeAsFileTime
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
RtlUnwind
RaiseException
WriteConsoleW
WriteFile
GetStdHandle
HeapSize
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
LoadLibraryW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
SetEnvironmentVariableA
ReadFile
GetCurrentDirectoryA
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetFileSize
GetVersion
InterlockedExchange
lstrlenA
CompareStringA
MultiByteToWideChar
CompareStringW
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CreateProcessA
SetCurrentDirectoryA
CopyFileA
Sleep
WriteProfileStringA
DeleteFileA
GetProfileStringA
GetCurrentThreadId
GetFileType
CreateFileW
user32
ShowWindow
SetWindowTextA
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
IsWindowEnabled
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
UnregisterClassA
LoadCursorA
GetSysColorBrush
GetMenuCheckMarkDimensions
DestroyMenu
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
MessageBoxA
LoadIconA
EnableWindow
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
GetClassNameA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ