Static task
static1
Behavioral task
behavioral1
Sample
0dbe7542b65692e024a68f7fbadb9d93b986f75d445984d446b76b2599f5986e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0dbe7542b65692e024a68f7fbadb9d93b986f75d445984d446b76b2599f5986e.exe
Resource
win10v2004-20231215-en
General
-
Target
0dbe7542b65692e024a68f7fbadb9d93b986f75d445984d446b76b2599f5986e
-
Size
1.3MB
-
MD5
7cc7323e674674ac819460b7923ba1d3
-
SHA1
326f440849d99c58e4d7443bcc4dbae9bcc6604c
-
SHA256
0dbe7542b65692e024a68f7fbadb9d93b986f75d445984d446b76b2599f5986e
-
SHA512
f58b2c9104bde00337460f2db946ed49c48d490e5a87d463815c8e65e9db69443e956a806c070f0e88fe237d220fd0136d01aa516365481fb6771d60de505153
-
SSDEEP
12288:C0lAxH/Mv5EzsUvmJg5/fOpQ9ElNi6bhiAOONcoy+EiSReX8Ae12qIvQvvp4/77D:C7xH/AEgUuZi9OqoUiSReX8Arq1j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dbe7542b65692e024a68f7fbadb9d93b986f75d445984d446b76b2599f5986e
Files
-
0dbe7542b65692e024a68f7fbadb9d93b986f75d445984d446b76b2599f5986e.exe windows:4 windows x86 arch:x86
d4e0ca0f7e4dec3e80ce59f56247c917
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
ReadPwrScheme
SetActivePwrScheme
CanUserWritePwrScheme
GetActivePwrScheme
pdh
PdhAddCounterA
PdhCollectQueryData
PdhCloseQuery
PdhGetFormattedCounterValue
PdhOpenQueryA
psapi
EnumProcessModules
GetModuleFileNameExA
EnumProcesses
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
shfolder
SHGetFolderPathA
kernel32
LocalAlloc
GetThreadLocale
GetFullPathNameA
SetEndOfFile
UnlockFile
LockFile
DuplicateHandle
GlobalFlags
SizeofResource
lstrcmpA
GetCurrentThread
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
VirtualProtect
lstrlenA
lstrcpynA
lstrcatA
GlobalGetAtomNameA
lstrcmpiA
InitializeCriticalSection
GetProfileStringA
InterlockedExchange
EnumCalendarInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MulDiv
Sleep
HeapAlloc
HeapFree
GetProcAddress
GetModuleHandleA
GetVersionExA
GetTickCount
GetVolumeInformationA
GetDriveTypeA
FindNextFileA
FindFirstFileA
CloseHandle
WriteFile
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
LeaveCriticalSection
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
lstrlenW
RtlUnwind
SetStdHandle
GetFileType
RaiseException
IsBadReadPtr
GetStartupInfoA
ExitProcess
CreateThread
ExitThread
GetTimeZoneInformation
GetACP
TerminateProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringA
LCMapStringW
SetHandleCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetCurrentProcess
Module32First
GetShortPathNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetCurrentThreadId
SetLastError
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
GetProcessIoCounters
CreateTimerQueueTimer
DeleteTimerQueueTimer
GetSystemTime
SystemTimeToFileTime
GetCommandLineA
GlobalLock
GlobalUnlock
AttachConsole
GetStdHandle
GetVersion
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLocalTime
GetDateFormatA
GetTimeFormatA
FindClose
CreateDirectoryA
SetFileAttributesA
GetVolumeNameForVolumeMountPointA
FindFirstVolumeA
FindNextVolumeA
FindVolumeClose
LoadLibraryA
FreeLibrary
GlobalAlloc
GlobalReAlloc
GlobalFree
GetDiskFreeSpaceA
GetModuleFileNameA
QueryPerformanceFrequency
QueryPerformanceCounter
DeviceIoControl
GetDiskFreeSpaceExA
GetWindowsDirectoryA
FlushFileBuffers
GetLastError
ReadFileEx
WriteFileEx
CreateFileA
DeleteFileA
VirtualAlloc
CancelIo
SleepEx
VirtualFree
SetFilePointer
ReadFile
lstrcpyA
user32
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
DefMDIChildProcA
TranslateAcceleratorA
TranslateMDISysAccel
DefFrameProcA
InvertRect
EndDialog
CharNextA
CopyAcceleratorTableA
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CreateDialogIndirectParamA
SetParent
SetRectEmpty
EndPaint
BeginPaint
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
MoveWindow
SetWindowTextA
IsDialogMessageA
CheckRadioButton
PostMessageA
SendDlgItemMessageA
GetAsyncKeyState
SetActiveWindow
SetFocus
RegisterClipboardFormatA
wvsprintfA
ValidateRect
GetMessageA
LoadStringA
PostQuitMessage
ShowOwnedPopups
SetWindowContextHelpId
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetScrollPos
GetTopWindow
WinHelpA
GetClassInfoA
RegisterClassA
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
IsWindowUnicode
CharUpperA
GetDCEx
LockWindowUpdate
MapWindowPoints
MapDialogRect
ReleaseDC
GetClientRect
GetSystemMenu
DestroyMenu
GetMenu
KillTimer
SendMessageA
GetCursorPos
MenuItemFromPoint
IsChild
GetFocus
EnableWindow
InvalidateRect
SetTimer
DestroyIcon
RedrawWindow
GetIconInfo
LoadImageA
ReleaseCapture
WindowFromPoint
ClientToScreen
SetCapture
GetCapture
GetParent
GetActiveWindow
DrawFocusRect
DrawStateA
OffsetRect
PostThreadMessageA
CreateWindowExA
GetClassLongA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
RegisterWindowMessageA
GetWindowPlacement
IsWindowVisible
ShowWindow
GetWindow
GetSysColorBrush
SetMenu
DrawMenuBar
CallNextHookEx
GetClassNameA
RemovePropA
UnhookWindowsHookEx
SetWindowsHookExA
IntersectRect
DeleteMenu
GetMenuState
GetDesktopWindow
GetMenuStringA
ModifyMenuA
GrayStringA
GetMenuDefaultItem
DrawTextA
TabbedTextOutA
DrawEdge
SetRect
GetMessagePos
GetMenuItemCount
GetMenuItemID
WindowFromDC
GetMenuInfo
GetMenuItemRect
GetMenuItemInfoA
IsMenu
SetMenuInfo
IsWindow
GetKeyState
UpdateWindow
LoadMenuA
GetSubMenu
SetMenuDefaultItem
TrackPopupMenu
BringWindowToTop
SetForegroundWindow
CreateIconIndirect
IsRectEmpty
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
IsIconic
DrawIcon
AppendMenuA
LoadBitmapA
LoadCursorA
SystemParametersInfoA
MessageBoxA
wsprintfA
GetDC
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
TranslateMessage
LoadIconA
SetWindowPos
PtInRect
GetPropA
SetPropA
SetWindowLongA
GetSystemMetrics
CallWindowProcA
GetWindowDC
DrawFrameControl
GetWindowRect
SetCursor
GetWindowLongA
CopyRect
InflateRect
FillRect
GetSysColor
gdi32
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
GetStockObject
GetObjectA
SetPixel
GetDeviceCaps
SetBkMode
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
MoveToEx
LineTo
SetTextAlign
TextOutA
CombineRgn
GetViewportExtEx
GetWindowExtEx
ExtCreatePen
GetTextMetricsA
PatBlt
GetMapMode
SetRectRgn
DPtoLP
GetTextColor
GetBkColor
LPtoDP
CreateRectRgnIndirect
GetDIBits
RealizePalette
CreatePalette
GetSystemPaletteEntries
CreateBitmap
CreateDIBSection
Rectangle
GetCurrentObject
DeleteDC
CreatePatternBrush
GetNearestColor
GetPixel
RoundRect
CreatePen
SetBrushOrgEx
UnrealizeObject
PtVisible
RectVisible
ExtTextOutA
Escape
CreateRectRgn
SelectClipRgn
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
SelectPalette
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExcludeClipRect
GetTextExtentPointA
CreateDIBitmap
IntersectClipRect
CreateSolidBrush
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueExA
RegOpenKeyExA
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ProcessTrace
SetTraceCallback
OpenTraceA
EnableTrace
GetTraceEnableFlags
CloseTrace
StartTraceA
ControlTraceA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegCloseKey
shell32
DragQueryFileA
DragFinish
SHGetPathFromIDListA
Shell_NotifyIconA
SHGetMalloc
SHBrowseForFolderA
ShellExecuteA
SHGetFileInfoA
comctl32
ImageList_ReplaceIcon
ord17
ImageList_AddMasked
ImageList_GetIconSize
ImageList_GetIcon
ImageList_GetImageCount
ImageList_Draw
ImageList_GetImageInfo
ImageList_Remove
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_SetBkColor
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoRegisterMessageFilter
CoRevokeClassObject
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoTaskMemAlloc
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
VarDateFromStr
VarBstrFromDate
SysStringLen
Sections
.text Size: 640KB - Virtual size: 637KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 552KB - Virtual size: 550KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ