oemig50.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c0e07a9b5d27aca1d5a68aab4b265f1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0e07a9b5d27aca1d5a68aab4b265f1c.exe
Resource
win10v2004-20240226-en
General
-
Target
c0e07a9b5d27aca1d5a68aab4b265f1c
-
Size
102KB
-
MD5
c0e07a9b5d27aca1d5a68aab4b265f1c
-
SHA1
c98949a931aebdf723b1dcc0368347ec56d1def1
-
SHA256
d3a4300a8411f2538fbb04193ec0158eb30de702fe573b9bce87eb981bc20fbc
-
SHA512
77d1639db3b454142d99b1b528c5595ecf6bfdf5095c7b52b51ea228df477ba5096eceee6a53153b931f171475714ac7327b27e4c21d7a2f78a767dce0fdfa40
-
SSDEEP
3072:z8EE5iHmnKlX1M625h5uDxUa47fMtkzXpDsK4qO:zv+bKzmzWqO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0e07a9b5d27aca1d5a68aab4b265f1c
Files
-
c0e07a9b5d27aca1d5a68aab4b265f1c.exe windows:5 windows x86 arch:x86
b496ff6f7a3596971eca54cc54a79354
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegOverridePredefKey
RegOpenKeyA
kernel32
GetLocaleInfoA
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
CloseHandle
GetLocalTime
WriteFile
lstrlenA
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetDiskFreeSpaceA
GetLastError
CreateDirectoryA
SystemTimeToFileTime
GetSystemTime
DeleteFileA
lstrcmpA
TlsSetValue
TlsGetValue
ReleaseMutex
TlsFree
TlsAlloc
WaitForSingleObject
CreateMutexA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
IsDBCSLeadByteEx
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetUnhandledExceptionFilter
user32
SetFocus
CheckDlgButton
SetForegroundWindow
EndDialog
IsDlgButtonChecked
DialogBoxParamA
MessageBoxA
ShowWindow
CreateDialogParamA
GetDesktopWindow
IsDialogMessageA
TranslateMessage
PeekMessageA
LoadStringA
GetDlgItem
SendMessageA
SetDlgItemTextA
DestroyWindow
CharPrevA
SetWindowPos
OffsetRect
DispatchMessageA
SystemParametersInfoA
GetParent
GetWindowRect
comctl32
InitCommonControlsEx
shlwapi
wnsprintfA
StrFormatByteSize64A
ole32
CoInitialize
CoGetMalloc
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE