Static task
static1
Behavioral task
behavioral1
Sample
0f662cabbb7402cc291252bbef95c103.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f662cabbb7402cc291252bbef95c103.exe
Resource
win10v2004-20231215-en
General
-
Target
0f662cabbb7402cc291252bbef95c103
-
Size
448KB
-
MD5
0f662cabbb7402cc291252bbef95c103
-
SHA1
1b3b7ec879e41fc3fe073e261e29c7bcc86964b4
-
SHA256
f279415bbade484f58d01830017e38dd4263bde2f5e46467a9b8ebaaea8120f2
-
SHA512
a4f49c957dfec85ea18ad6601f0d9f3ee4dd42dac8c831e7125762735234be0b50669596319110dbb581aa9f2b13b4a8bc89ae46b85fa3877fc1a5602b246054
-
SSDEEP
12288:nykpuWbq8WdqNpF1/bFOra8BPZaw2HlBZZ9whZVIjCc/:nzuWbqXq7bFqJM/ZZyhHY/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f662cabbb7402cc291252bbef95c103
Files
-
0f662cabbb7402cc291252bbef95c103.exe windows:4 windows x86 arch:x86
785eb204b8f99082f7625168110ae58f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
VirtualAlloc
GetConsoleTitleW
FlushViewOfFile
GetLocaleInfoA
WaitForMultipleObjects
EnumTimeFormatsA
CreatePipe
EnumResourceNamesW
GetVersionExA
FlushInstructionCache
WriteConsoleOutputW
GetPrivateProfileSectionNamesW
FindResourceW
GetProcessTimes
ReadFileScatter
ReadFile
WriteConsoleOutputAttribute
SetThreadExecutionState
ReleaseSemaphore
CreateFileMappingW
CreateDirectoryW
UnmapViewOfFile
SetConsoleCursorInfo
GetFullPathNameA
GetLocaleInfoW
CreateDirectoryExA
TerminateThread
WaitCommEvent
FoldStringW
OpenMutexW
SleepEx
CreateRemoteThread
GetUserDefaultLCID
MultiByteToWideChar
GlobalFindAtomA
GlobalDeleteAtom
UnlockFileEx
lstrlenW
InterlockedCompareExchange
ReadDirectoryChangesW
GetThreadLocale
FileTimeToSystemTime
WritePrivateProfileStructA
BeginUpdateResourceW
GetPrivateProfileIntW
DeleteCriticalSection
GetPrivateProfileIntA
VirtualUnlock
FindFirstChangeNotificationW
LocalCompact
GetProcessHeaps
GetExitCodeThread
GetCalendarInfoW
ReadProcessMemory
lstrcmpiW
GlobalReAlloc
DisableThreadLibraryCalls
ResumeThread
GetStdHandle
FindCloseChangeNotification
OpenEventA
GetProcessShutdownParameters
ConnectNamedPipe
WriteProcessMemory
FillConsoleOutputAttribute
WriteProfileSectionA
GetNumberOfConsoleMouseButtons
GetSystemTime
FreeEnvironmentStringsA
GetSystemDirectoryA
MoveFileW
OpenSemaphoreA
GetDiskFreeSpaceW
RtlFillMemory
GlobalAddAtomA
HeapCompact
GlobalFlags
SetWaitableTimer
MoveFileExA
GetExitCodeProcess
MapViewOfFileEx
SetThreadPriority
LocalUnlock
GetProfileIntA
MoveFileExW
GetDateFormatW
GetPrivateProfileStructW
CommConfigDialogW
WriteConsoleOutputA
GetProfileStringW
DefineDosDeviceW
FindAtomA
GetNumberOfConsoleInputEvents
ExpandEnvironmentStringsA
SetHandleCount
GlobalGetAtomNameW
GetTempPathW
GetProfileStringA
EnumSystemCodePagesW
RemoveDirectoryW
lstrcpyA
GetHandleInformation
TlsGetValue
FindResourceA
DebugActiveProcess
SuspendThread
SetFileAttributesA
GlobalHandle
SystemTimeToTzSpecificLocalTime
GetProcessPriorityBoost
RemoveDirectoryA
MapViewOfFile
SearchPathA
CreateToolhelp32Snapshot
GetConsoleOutputCP
SetConsoleActiveScreenBuffer
LocalHandle
EnumTimeFormatsW
InterlockedDecrement
VirtualQueryEx
GetConsoleTitleA
OpenFile
MoveFileA
CreateNamedPipeA
GlobalAlloc
TransactNamedPipe
InterlockedIncrement
GetAtomNameA
EnumResourceTypesA
GetNamedPipeHandleStateA
MulDiv
LocalFree
SetComputerNameA
comdlg32
ReplaceTextW
ChooseFontW
ReplaceTextA
PrintDlgA
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 251KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ