Static task
static1
Behavioral task
behavioral1
Sample
0fec1ca8066667139096a68ca71cbedb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0fec1ca8066667139096a68ca71cbedb.exe
Resource
win10v2004-20231215-en
General
-
Target
0fec1ca8066667139096a68ca71cbedb
-
Size
457KB
-
MD5
0fec1ca8066667139096a68ca71cbedb
-
SHA1
5ee6f8f267f69468bbec1cb5a4ef84dafc2070d3
-
SHA256
2355c80b70f0bc84d4f3c3bea2e2bce12a785b8cd74d4389c5dd3d7de48d1d91
-
SHA512
cef0e96d51b600ab46954c61f33449e84e67453b49cde0d25dd2b3e39dc0ac7a6e198fae4eb2b86eed96dc59a91310905d9338e35f4100362f383832cfb606f6
-
SSDEEP
6144:o6aDmiZv052rsFR2n5jZq1VYel/7nrlK+YXIaBPKOmmMxnCJgrH:o6aTa26YCPl/brlK7IbbtCJgrH
Malware Config
Signatures
Files
-
0fec1ca8066667139096a68ca71cbedb.exe windows:4 windows x86 arch:x86
401b3aa601b867a84cb78fd990ccf79a
Code Sign
6d:ba:eb:8b:c5:3f:3d:77:be:a8:54:19:c5:3f:53:87:0f:66:9e:f6Signer
Actual PE Digest6d:ba:eb:8b:c5:3f:3d:77:be:a8:54:19:c5:3f:53:87:0f:66:9e:f6Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
GetDefaultCommConfigA
ExitProcess
VirtualAlloc
ReadFile
GetModuleHandleW
GetLastError
GetTickCount
CreateFileMappingA
CloseHandle
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
GetCommandLineA
QueryPerformanceCounter
GetStringTypeA
MultiByteToWideChar
LockResource
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
SetFilePointer
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
GetUserDefaultLangID
CreateThread
GetModuleHandleA
GetProcAddress
GetVersionExA
WriteFile
GetStringTypeW
LCMapStringA
LCMapStringW
LoadLibraryA
user32
GetDC
IsChild
MessageBoxA
GetSystemMetrics
InvalidateRect
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
RegisterClassW
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
CreateDialogParamA
LoadStringA
GetClientRect
DialogBoxParamA
CreateWindowExA
IsDialogMessageA
gdi32
Rectangle
GetDeviceCaps
SetBkColor
TextOutW
CreatePen
ExcludeClipRect
GetClipBox
CreatePenIndirect
advapi32
GetUserNameA
AllocateLocallyUniqueId
RegCreateKeyExA
RegCloseKey
ole32
CoInitialize
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ