Static task
static1
Behavioral task
behavioral1
Sample
0bd4dfb3a29e40008ea56d790af938d581c50a807485addfcdd715297560ed39.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0bd4dfb3a29e40008ea56d790af938d581c50a807485addfcdd715297560ed39.exe
Resource
win10v2004-20240412-en
General
-
Target
0bd4dfb3a29e40008ea56d790af938d581c50a807485addfcdd715297560ed39
-
Size
200KB
-
MD5
45fa7f9099a6e215b3062b613d2b1e25
-
SHA1
10da2d0b8d86c84b150d2707092f6a7e09bf50ce
-
SHA256
0bd4dfb3a29e40008ea56d790af938d581c50a807485addfcdd715297560ed39
-
SHA512
7ad729b840e9efff60e59c986bf696d654091c6c7a9a49c14d8f762a1146bcc7a93e0261df0789faa505a4795b41358cb05245ddf53efa9cf74a359086d9ef22
-
SSDEEP
3072:gCuOurpn6UXQUxPIwZxDV2jRnCdX2J1D9m/pTNWF:wOulVgUxPhr52dwmJ1ZWpxW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bd4dfb3a29e40008ea56d790af938d581c50a807485addfcdd715297560ed39
Files
-
0bd4dfb3a29e40008ea56d790af938d581c50a807485addfcdd715297560ed39.exe windows:4 windows x86 arch:x86
f2c864e34a80535b126cdaf2b8c92e69
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
WinExec
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
InterlockedCompareExchange
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
Sleep
user32
DrawIcon
IsIconic
GetClientRect
SendMessageA
LoadIconA
GetSystemMetrics
EnableWindow
mfc80
ord4541
ord310
ord566
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord578
ord1489
ord299
ord6703
ord1482
ord2020
ord297
ord1917
ord744
ord5346
ord555
ord1123
ord781
ord5119
ord784
ord3389
ord334
ord3255
ord593
ord1486
ord5563
ord304
ord1084
ord572
ord3171
ord4486
ord2991
ord2862
ord5200
ord1599
ord1655
ord1656
ord3683
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4234
ord1402
ord3946
ord1617
ord1620
ord5915
ord6725
ord1547
ord2089
ord4098
ord1483
ord1931
ord591
ord1063
ord605
ord762
ord354
ord3182
ord4262
ord5203
ord4244
ord1401
ord5912
ord6724
ord1551
ord1670
ord1671
ord4890
ord4735
ord4212
ord5182
ord1873
ord1791
ord1794
ord4749
ord709
ord501
ord2168
ord6236
ord2657
ord2164
ord630
ord3088
ord2021
ord385
ord2747
ord3641
ord4580
ord4108
ord5710
ord2271
ord6174
ord1580
ord2346
ord6306
ord6305
ord5331
ord262
ord6297
ord3110
ord3109
ord1185
ord764
ord1964
ord1207
msvcr80
exit
getenv
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CxxFrameHandler3
system
_setmbcp
_itoa
_stricmp
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ