Static task
static1
Behavioral task
behavioral1
Sample
0b46a4d3e595b1a3c9291362f28c4b6b2b0f59b4c0a3e72b445c7f371180bd1e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b46a4d3e595b1a3c9291362f28c4b6b2b0f59b4c0a3e72b445c7f371180bd1e.exe
Resource
win10v2004-20240226-en
General
-
Target
0b46a4d3e595b1a3c9291362f28c4b6b2b0f59b4c0a3e72b445c7f371180bd1e
-
Size
13KB
-
MD5
5eba74babc3e0c826240dedd39b0cad1
-
SHA1
3bf269fee671cd1f574a09781263c864cdc299b3
-
SHA256
0b46a4d3e595b1a3c9291362f28c4b6b2b0f59b4c0a3e72b445c7f371180bd1e
-
SHA512
6466878939180281ae6976e36cdbde7a425880a9dc7028b8f081139b835be3961e3dcd3393fa2f94bafa87d68e22fb462dc0d2f91b0422e485e998fa8874d4f3
-
SSDEEP
192:4JWJe/w1ErLuxLM10G7uZlAZBRwbLpCKQ7hHEZ8MXhIIX:4g892xZGISZgLpKyiI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b46a4d3e595b1a3c9291362f28c4b6b2b0f59b4c0a3e72b445c7f371180bd1e
Files
-
0b46a4d3e595b1a3c9291362f28c4b6b2b0f59b4c0a3e72b445c7f371180bd1e.exe windows:5 windows x64 arch:x64
8a471ada698f054c1111b2585b7b4af6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
hid
HidD_GetHidGuid
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
GetCurrentProcessId
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EncodePointer
GetSystemTimeAsFileTime
CreateEventW
WaitForSingleObject
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Sleep
GetModuleFileNameA
GetCurrentProcess
WTSGetActiveConsoleSessionId
CloseHandle
RtlCaptureContext
GetStartupInfoW
user32
TranslateMessage
PostQuitMessage
LoadCursorW
LoadIconW
RegisterClassW
CreateWindowExW
GetMessageW
DestroyWindow
DispatchMessageW
UnregisterDeviceNotification
DefWindowProcW
RegisterDeviceNotificationW
gdi32
GetStockObject
advapi32
CreateProcessAsUserA
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenSCManagerW
OpenServiceW
QueryServiceStatus
StartServiceW
CloseServiceHandle
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
msvcr100
_onexit
_wcsupr
strrchr
wcsstr
memset
strcat_s
_wcslwr
wcscpy_s
_amsg_exit
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ