Static task
static1
Behavioral task
behavioral1
Sample
0f00dac2b2bcb9bdabb163e48e5c2dfe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f00dac2b2bcb9bdabb163e48e5c2dfe.exe
Resource
win10v2004-20231222-en
General
-
Target
0f00dac2b2bcb9bdabb163e48e5c2dfe
-
Size
168KB
-
MD5
0f00dac2b2bcb9bdabb163e48e5c2dfe
-
SHA1
64113fa1f73893c1d33dcc9a04f6423156e6f161
-
SHA256
774d9c0a25858189a684387364caef618327ce8885234ad57a6caedacfee70f6
-
SHA512
24870cc19027143163aa5ac833e0c3f9fc7399be44e198b4ab67d9a7724cde4f2f71049261946d3d9e82ebf4672bb9df220d26b4aa60fd08495024f642fdcac5
-
SSDEEP
3072:FcbEk8kGj+uKX/ylshudrecJNK67pqXjr2Tos3VXEYJbuHqzd+1:FcbEPkhpyrect7p+jicMVEGu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f00dac2b2bcb9bdabb163e48e5c2dfe
Files
-
0f00dac2b2bcb9bdabb163e48e5c2dfe.exe windows:5 windows x86 arch:x86
507bdd8a2b069a36e11619f4010f1e2f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
lstrcmpiA
lstrcmpiW
DeleteFileW
GetWindowsDirectoryA
MulDiv
GetTickCount
GetThreadLocale
GetCommandLineA
GlobalFindAtomW
GetModuleHandleW
GetConsoleOutputCP
GlobalFindAtomA
GetCurrentProcessId
GetVersion
GetProcessHeap
RemoveDirectoryA
GetModuleHandleA
GetCommandLineW
GetStartupInfoA
CopyFileA
GetDriveTypeA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentThread
SetCurrentDirectoryA
lstrlenA
GetUserDefaultLangID
lstrcmpA
lstrlenW
GetOEMCP
GetCurrentProcess
DeleteFileA
VirtualAlloc
VirtualFree
gdi32
RestoreDC
CreateSolidBrush
DeleteObject
GetStockObject
GetTextMetricsA
SetStretchBltMode
RectVisible
CreatePalette
LineTo
DeleteDC
GetDeviceCaps
CreatePen
GetPixel
GetObjectA
SetMapMode
CreateFontIndirectA
CreateCompatibleDC
SelectObject
PatBlt
SetTextAlign
SetTextColor
GetClipBox
SelectPalette
SaveDC
user32
GetParent
GetSystemMetrics
GetDC
CharNextA
GetDesktopWindow
TranslateMessage
glu32
gluNurbsCallback
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Qpjosu D Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Lrgkjaxr Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ