Static task
static1
Behavioral task
behavioral1
Sample
0c1556304aca60412c5da67d7ad3cf94.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c1556304aca60412c5da67d7ad3cf94.exe
Resource
win10v2004-20231215-en
General
-
Target
0c1556304aca60412c5da67d7ad3cf94
-
Size
284KB
-
MD5
0c1556304aca60412c5da67d7ad3cf94
-
SHA1
ec513a1a925dfbe41ca6bfdfcfb2493a9787f619
-
SHA256
e261bb1dfef3d086aa96168c2d9fd6f20c3b7889cc90f5f28f1f0f55f1d14779
-
SHA512
893215b4a6393667ec7d278f84a16a6e3ed5a784282b730cea03f7e2d1e17143a9464461eac8c16a7dd4bc38ff25a10d6f5c6a406f2b1ea7dde0553edbaaab4d
-
SSDEEP
6144:hTE7s4T0c0L0k33isik20fCHC8M8V5SBS3NLhWFVKELFa:1wuco0k3SsiYfYSw1Q4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c1556304aca60412c5da67d7ad3cf94
Files
-
0c1556304aca60412c5da67d7ad3cf94.exe windows:4 windows x86 arch:x86
69c940632cfc4382055a642111a2f463
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
GetWindowsDirectoryA
MapViewOfFile
OpenFileMappingA
GetTempFileNameA
GetTempPathA
SetLastError
GetLastError
TerminateProcess
OpenProcess
GetFileSize
WriteFile
SetFilePointer
SetFileAttributesA
GetLocalTime
GetCurrentProcess
ResumeThread
SetThreadContext
VirtualProtectEx
GetModuleFileNameA
VirtualAllocEx
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetThreadContext
CreateProcessA
GetCurrentDirectoryA
GetCommandLineA
GetModuleHandleA
DeleteFileA
CopyFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetProcessVersion
lstrcmpiA
MultiByteToWideChar
CreateFileA
CloseHandle
WriteProcessMemory
GetCurrentProcessId
user32
MessageBoxA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
msvcrt
time
fwrite
_wcsnicmp
wcslen
fopen
fseek
fread
fclose
ftell
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
_strnicmp
_itoa
_wcsicmp
msvcp60
??0_Lockit@std@@QAE@XZ
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ