Static task
static1
Behavioral task
behavioral1
Sample
0f1a60fa7d248b1da464492d09cc948c04382c6194f9c00a8119735796a53e5d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f1a60fa7d248b1da464492d09cc948c04382c6194f9c00a8119735796a53e5d.exe
Resource
win10v2004-20231215-en
General
-
Target
0f1a60fa7d248b1da464492d09cc948c04382c6194f9c00a8119735796a53e5d
-
Size
161KB
-
MD5
35fd6ea812b99139b3d45eb47df3490a
-
SHA1
7b6ab6fcf7252ad4821b3b806336b9cce1d82184
-
SHA256
0f1a60fa7d248b1da464492d09cc948c04382c6194f9c00a8119735796a53e5d
-
SHA512
2ea96de0b18bd0d32f83f293f71ea5e84842471e3389ac90d6091bea11d81fe165642e6e83ae98b08621f1cef5bb598880e2cac5f7cb21ea6090cbb6ab561f85
-
SSDEEP
3072:wKGrkCJj+pXHaS/cOJs0/r83WwuXdXcDpIPs5:wKGap3ze0D83WVsJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f1a60fa7d248b1da464492d09cc948c04382c6194f9c00a8119735796a53e5d
Files
-
0f1a60fa7d248b1da464492d09cc948c04382c6194f9c00a8119735796a53e5d.exe windows:1 windows x86 arch:x86
a11c2a003af7a01073d967b0f539304a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
DefWindowProcW
DestroyWindow
DispatchMessageW
EnableWindow
GetCursorPos
GetMessageW
GetSystemMenu
GetWindowLongW
LoadStringW
MessageBoxW
PostMessageW
SendMessageW
SetWindowLongW
SetWindowTextW
TranslateMessage
wsprintfW
CreateWindowExW
kernel32
CloseHandle
CreateFileW
DeleteFileW
FormatMessageW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetTickCount
LoadLibraryA
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetThreadUILanguage
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualProtect
WideCharToMultiByte
lstrcmpW
lstrlenW
FreeLibrary
imm32
ImmGetContext
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
AUTO Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.sys Size: 150B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE