C b
Static task
static1
Behavioral task
behavioral1
Sample
0ba5efbb88dd3a6cf12923ed9f6abe16431e839cf0d0beebc3e2e0cdf1a6af5a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ba5efbb88dd3a6cf12923ed9f6abe16431e839cf0d0beebc3e2e0cdf1a6af5a.exe
Resource
win10v2004-20231215-en
General
-
Target
0ba5efbb88dd3a6cf12923ed9f6abe16431e839cf0d0beebc3e2e0cdf1a6af5a
-
Size
68KB
-
MD5
b76e77b52d682f0938d120f3fe011660
-
SHA1
c1fdc71284b5a34b170470a6071626f40f4a4f65
-
SHA256
0ba5efbb88dd3a6cf12923ed9f6abe16431e839cf0d0beebc3e2e0cdf1a6af5a
-
SHA512
5547b31fd4635d81e8ea4d426c0133f291b0a1caa3237efb21f849fe71d2d504bf59a1d25e3a20265e6a6f8ce108e6adda47f66eed2c64ecfa96c593efb80177
-
SSDEEP
768:Bw3flOaKerl+0UoJJNeFXVX3lD2PWxv52UEA:BwPlOPmlbeFB3lDgWxv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ba5efbb88dd3a6cf12923ed9f6abe16431e839cf0d0beebc3e2e0cdf1a6af5a
Files
-
0ba5efbb88dd3a6cf12923ed9f6abe16431e839cf0d0beebc3e2e0cdf1a6af5a.exe windows:5 windows x86 arch:x86
4ca962fd475e46eae1935406bdb62435
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcsstr
srand
wcslen
_wfopen
fseek
ftell
fclose
strlen
mbstowcs
rand
memset
memcpy
wininet
InternetOpenUrlW
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetOpenW
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileW
shlwapi
StrCmpNW
PathMatchSpecW
PathFileExistsW
PathFindFileNameW
PathFileExistsA
kernel32
SetFileAttributesW
CopyFileW
lstrcmpiW
CreateDirectoryW
FindFirstFileW
lstrcmpW
ExitThread
FindNextFileW
FindClose
RemoveDirectoryW
GetLogicalDrives
GetDriveTypeW
QueryDosDeviceW
GetVolumeInformationW
GetModuleFileNameW
CreateProcessW
CreateThread
GetTickCount
CopyFileA
ExitProcess
GetLastError
CreateMutexA
MoveFileA
MoveFileW
DeleteFileA
GetModuleHandleA
MoveFileExW
ExpandEnvironmentStringsW
SetEndOfFile
SetFilePointer
CloseHandle
UnmapViewOfFile
HeapFree
HeapAlloc
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
DeleteFileW
Sleep
WriteFile
lstrcpyW
GetStartupInfoA
user32
ShowWindow
SetForegroundWindow
SetFocus
CloseWindow
wsprintfA
wsprintfW
FindWindowA
advapi32
CryptAcquireContextW
CryptEncrypt
CryptImportKey
CryptVerifySignatureA
CryptHashData
CryptCreateHash
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegSetValueExW
CryptDestroyKey
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ