Static task
static1
Behavioral task
behavioral1
Sample
04bc06309eb7d4b6a17d23ee6725a4508920946ac4ad26841810e97b21ca6ced.exe
Resource
win7-20240221-en
General
-
Target
04bc06309eb7d4b6a17d23ee6725a4508920946ac4ad26841810e97b21ca6ced
-
Size
622KB
-
MD5
0a37942c9ab928af9c799779aa048bd0
-
SHA1
68c7ce980686b9c2001d81eace8f81ce92b6ae0e
-
SHA256
04bc06309eb7d4b6a17d23ee6725a4508920946ac4ad26841810e97b21ca6ced
-
SHA512
c8b726dc85d4d6566b463255e3d99658cab090b01b281892386d8ee7815ebeffb0e1c132d1cc915bbc8f898a5dbcc177e378f9c357eec3122b5347804737545c
-
SSDEEP
12288:SAc4Rq4Uj2mI7bJj6vkAc8473f1CGC9i+uOrSwS0nIrmKV7:vUj2XND8S3NCGYixwSwJqLV7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04bc06309eb7d4b6a17d23ee6725a4508920946ac4ad26841810e97b21ca6ced
Files
-
04bc06309eb7d4b6a17d23ee6725a4508920946ac4ad26841810e97b21ca6ced.exe windows:5 windows x86 arch:x86
876ea88bce5f6de9d942fa84df7b2202
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GetProcAddress
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
GetVersionExW
lstrcpynA
lstrlenA
lstrcpynW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
LockResource
FindResourceExW
WideCharToMultiByte
VirtualAlloc
HeapFree
GetProcessHeap
VirtualFree
LoadLibraryA
IsBadReadPtr
HeapAlloc
GetModuleFileNameA
GetCommandLineW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
EnterCriticalSection
GetConsoleMode
GetConsoleCP
GetStringTypeW
LoadLibraryW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStdHandle
WriteFile
ExitProcess
CreateFileW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
GetLastError
GetSystemInfo
GetTempPathA
FlushFileBuffers
Sleep
InterlockedPushEntrySList
IsProcessorFeaturePresent
HeapDestroy
HeapReAlloc
HeapSize
RtlUnwind
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
user32
DefWindowProcW
CharNextW
SetWindowLongW
GetWindowLongW
IsWindow
TrackPopupMenuEx
PeekMessageW
PtInRect
MessageBeep
SetWindowPos
CallWindowProcW
RemoveMenu
AppendMenuW
MonitorFromPoint
GetMonitorInfoW
CreatePopupMenu
GetMenuItemCount
DestroyMenu
LoadStringA
PostQuitMessage
SetFocus
LoadStringW
InvalidateRect
GetWindowRect
TranslateAcceleratorW
SetMenuDefaultItem
GetMenuItemInfoW
SetMenuItemInfoW
MapWindowPoints
GetClientRect
SendMessageW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
oleaut32
VarUI4FromStr
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 420KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ