Static task
static1
Behavioral task
behavioral1
Sample
0f1492e3af8180c0621e188cc8062065.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f1492e3af8180c0621e188cc8062065.exe
Resource
win10v2004-20231215-en
General
-
Target
0f1492e3af8180c0621e188cc8062065
-
Size
24KB
-
MD5
0f1492e3af8180c0621e188cc8062065
-
SHA1
731f3ab4f4aeaa1d371e9fe52de9ee2beb812001
-
SHA256
f4eec76e0c63815a9aaee30a194bdb3ce721fdd3bee6f751cb0d0e55ef2d6e53
-
SHA512
511b0d32f92cb987d0b0e2db41cb44517eb56a678bdf1784706bc294e58cc05020d703ffb0a91f108c17e3e3420f860ae5b9ee137e13f9ef83b8350225d0625a
-
SSDEEP
384:6tZle8XyxJ1psW/nDr66QC2YbSeWF6GszjvjxPM4aPvbaHV6Za:6tv83cCkvUfblM4I8Vq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f1492e3af8180c0621e188cc8062065
Files
-
0f1492e3af8180c0621e188cc8062065.exe windows:4 windows x86 arch:x86
35a4b31df0469b9f152f50a8ff0202d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
SetThreadContext
GetThreadContext
CreateProcessA
lstrcatA
lstrcpyA
lstrlenA
ExitProcess
DeleteFileA
MoveFileA
GetTempFileNameA
GetTickCount
GetComputerNameA
GetVolumeInformationA
Sleep
VirtualAlloc
lstrcmpA
LoadLibraryA
WaitForSingleObject
CopyFileA
GetLastError
CreateMutexA
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryExA
GetVersionExA
SetPriorityClass
GetCurrentProcess
ReadProcessMemory
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
VirtualFree
CreateFileA
WriteFile
CreateThread
CloseHandle
LocalReAlloc
ExitThread
LocalAlloc
LocalFree
user32
wsprintfA
advapi32
LookupPrivilegeValueA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
ws2_32
inet_addr
htons
socket
setsockopt
connect
send
recv
closesocket
WSAStartup
__WSAFDIsSet
accept
bind
gethostbyname
getpeername
getsockname
listen
select
wininet
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
ntdll
NtQuerySystemInformation
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
FYPMJW8F Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
FYPMJW8F Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MA0;A5EH Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
=FKD6AQD Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
OMT7DE7U Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
92GD:G2D Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
H0O2HD2R Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
>?@S1MKE Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
TM9?BTX= Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BB96CXH9 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3<Q?@VES Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE