Static task
static1
Behavioral task
behavioral1
Sample
0ef761d2588f48a9eea99c3c67d8b908.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ef761d2588f48a9eea99c3c67d8b908.exe
Resource
win10v2004-20231215-en
General
-
Target
0ef761d2588f48a9eea99c3c67d8b908
-
Size
31KB
-
MD5
0ef761d2588f48a9eea99c3c67d8b908
-
SHA1
b06e6bf38d298eff01ebd31474a747e6ef9fd371
-
SHA256
aaf02ded2004aa65d9abd6d2aa21268f062688f4911b1a12b76e0f4179ebf1b9
-
SHA512
3d4f1ee9f0f45b885edf56313ea2653cc8d9f380c60bcb911c0aa7180f01c6d2ee53bfed10d4619467f400751ead2f957060b207b8c670f4f1397ff3ad364bce
-
SSDEEP
768:RdkW+m9o5tttFya3QXp0wqQPGwkc7OgEzLJuObF:7B9Cvkt0wZewn7ORLsObF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ef761d2588f48a9eea99c3c67d8b908
Files
-
0ef761d2588f48a9eea99c3c67d8b908.exe windows:5 windows x64 arch:x64
bd4e42f72e1ee9903cda4f57e40a3b03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
WriteFile
GetModuleFileNameA
GetTempPathA
FreeResource
LockResource
GetLastError
SizeofResource
FindResourceA
GetModuleHandleA
GetSystemDirectoryA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetWindowsDirectoryA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
LoadResource
SetFileAttributesA
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetSystemTimeAsFileTime
user32
KillTimer
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
msvcr90
fwrite
fclose
remove
??3@YAXPEAX@Z
memcpy
??2@YAPEAX_K@Z
_amsg_exit
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
_encode_pointer
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
strlen
malloc
memset
sprintf
free
strcpy
strcat
strrchr
fopen
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ