Static task
static1
Behavioral task
behavioral1
Sample
a0b5782d7b7cbb2f0776eab4cf24a5e1709f0c4692ae0b21afd1195f80ec6c41.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0b5782d7b7cbb2f0776eab4cf24a5e1709f0c4692ae0b21afd1195f80ec6c41.exe
Resource
win10v2004-20240412-en
General
-
Target
a0b5782d7b7cbb2f0776eab4cf24a5e1709f0c4692ae0b21afd1195f80ec6c41
-
Size
10.0MB
-
MD5
f66a499da1e563df6a1b1ae9671edf50
-
SHA1
c3336a66b8bed490775d71a7c043649cec0b0d29
-
SHA256
a0b5782d7b7cbb2f0776eab4cf24a5e1709f0c4692ae0b21afd1195f80ec6c41
-
SHA512
208aa16f7555efe6d0989c601f459e886d759168d583f307fcab6491ca932fbcc5181d53abb86dcbe3d4c848ac56c2f46028350037180dd939d74819904c879f
-
SSDEEP
196608:boV3MNPhVz6u87cGPfIjRHaiBsvZTkqUlrRqFRLRCLWE6UwN3dme:u0PhVPfjVaLyrEFRLRCrfwB7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0b5782d7b7cbb2f0776eab4cf24a5e1709f0c4692ae0b21afd1195f80ec6c41
Files
-
a0b5782d7b7cbb2f0776eab4cf24a5e1709f0c4692ae0b21afd1195f80ec6c41.exe windows:5 windows x86 arch:x86
b48671fed9d5ca4906417d42fcdb066b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ResetEvent
CreateEventW
CloseHandle
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryW
GetModuleFileNameW
FormatMessageW
LocalFree
GetWindowsDirectoryW
CreateFileW
SetFileTime
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
GetFileInformationByHandle
DeleteFileW
GetShortPathNameW
GetFullPathNameW
lstrlenW
GetCurrentDirectoryW
GetTempFileNameW
FindClose
FindFirstFileW
FindNextFileW
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
DeleteCriticalSection
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetCurrentProcessId
InitializeCriticalSection
QueryPerformanceCounter
GetTickCount
Sleep
LocalAlloc
GetProcAddress
SetCurrentDirectoryW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
SetThreadUILanguage
SetThreadLocale
GetVersion
GetCommandLineW
CreateProcessW
GetExitCodeProcess
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
IsValidCodePage
GetOEMCP
RaiseException
GetACP
GetCPInfo
LoadLibraryA
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
WaitForSingleObject
SetEvent
GetVersionExW
VirtualAlloc
GetCurrentThreadId
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
HeapFree
HeapAlloc
ExitThread
CreateThread
HeapReAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetModuleHandleW
ExitProcess
GetModuleFileNameA
TlsGetValue
user32
SetForegroundWindow
CharUpperW
GetWindowRect
DestroyWindow
RegisterWindowMessageW
AdjustWindowRect
LoadImageW
LoadIconW
KillTimer
SetTimer
EndDialog
IsDlgButtonChecked
SetDlgItemTextW
GetDlgItem
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
LoadStringW
DialogBoxParamW
CreateDialogParamW
SystemParametersInfoW
PeekMessageW
GetDesktopWindow
MessageBoxW
SendMessageW
GetWindowLongW
SetWindowLongW
ShowWindow
MoveWindow
PostMessageW
gdi32
GetObjectW
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteExW
ole32
CoInitializeEx
CoInitialize
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
VariantClear
SysAllocString
Sections
.text Size: 193KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ