Resubmissions
12-04-2024 14:12
240412-rjbyxaba69 1012-04-2024 13:53
240412-q61p4sea2y 812-04-2024 13:52
240412-q6cy2sea2v 712-04-2024 13:51
240412-q6cchsea2s 1012-04-2024 13:51
240412-q6b2raah72 1009-04-2024 06:39
240409-heygnsca4y 809-04-2024 06:39
240409-hern5agf52 809-04-2024 06:38
240409-heg5pagf47 1009-04-2024 06:38
240409-hebmxagf45 818-12-2023 04:48
231218-fe484sadc4 10Static task
static1
Behavioral task
behavioral1
Sample
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b.exe
Resource
win11-20240221-en
General
-
Target
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b
-
Size
1.9MB
-
MD5
1543d5f2bf658fb837d5aabf4c81d6c1
-
SHA1
f7d25bba549095a63e75174a6318aae83fca1326
-
SHA256
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b
-
SHA512
569d08943cf4e12a0f87d01760f8aa60cf20cb846f49724ee827585f6670f33f3dc3e088e453ec2bb9f490b66d1a16153c435d9f7cb9ffab98cf23c481227e36
-
SSDEEP
49152:gWRJu3Kbha03xUDhZSG5JgFCDT72+yZR64ooyHWUUz7fY0vE:gdU/WDhc7FNZR/h3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b
Files
-
0e0f1e9b6ef23a6f9a81442521969df413664441c8da9c0de75395827d61763b.exe windows:5 windows x86 arch:x86
e262a64f7df874cd773399218492ca7e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
PeekNamedPipe
ConvertThreadToFiber
UpdateResourceA
InterlockedIncrement
InterlockedDecrement
GetNamedPipeHandleStateA
GetEnvironmentStringsW
GetProfileSectionA
WriteConsoleInputA
SetVolumeMountPointW
GetModuleHandleW
LocalFlags
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
GetVersionExW
GetConsoleAliasW
WriteConsoleW
WritePrivateProfileSectionW
ReadFile
GetCompressedFileSizeA
GetStartupInfoW
GetShortPathNameA
FindFirstFileA
GetCPInfoExW
GetLastError
SetLastError
GetProcAddress
HeapSize
IsValidCodePage
OpenWaitableTimerA
WriteConsoleA
LocalAlloc
FindFirstVolumeMountPointW
UpdateResourceW
FindNextFileW
GetCurrentDirectoryA
WaitForDebugEvent
GetVolumeNameForVolumeMountPointW
GlobalAddAtomW
GetProfileSectionW
CommConfigDialogW
CreateFileW
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetCommandLineW
LocalUnlock
VirtualUnlock
DebugActiveProcess
GetConsoleCP
SetFilePointer
WideCharToMultiByte
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CloseHandle
user32
CharToOemBuffA
CharUpperBuffW
GetDlgCtrlID
gdi32
GetCharWidthW
advapi32
DuplicateToken
winhttp
WinHttpCloseHandle
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ