Static task
static1
Behavioral task
behavioral1
Sample
0dc66c63bd8c0725dd93e960b65f21899bd4012761cc2046694a6c5e026f6d6a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dc66c63bd8c0725dd93e960b65f21899bd4012761cc2046694a6c5e026f6d6a.exe
Resource
win10v2004-20240412-en
General
-
Target
0dc66c63bd8c0725dd93e960b65f21899bd4012761cc2046694a6c5e026f6d6a
-
Size
587KB
-
MD5
0cd34d4c3bfa5c81a11137496ac7b4f4
-
SHA1
1e896ad0d2037a7cd78bdb5458b902c795719fb8
-
SHA256
0dc66c63bd8c0725dd93e960b65f21899bd4012761cc2046694a6c5e026f6d6a
-
SHA512
863a213f62e95685ebf47afb23434ce1531d53fcad891a77e92fe42abcacde8020ebf7567d594761ea0ac6235a4696010d1325234792895fac6af83f150c47c9
-
SSDEEP
6144:zUiUNGJVqSUfjpU29ENHgofGynG5J2x1rzclIPZSv7f1yVAY0Ecb5RZO4ptLNZQP:wzAJq9ExgofNn5Lq7DWTc9RBtBu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dc66c63bd8c0725dd93e960b65f21899bd4012761cc2046694a6c5e026f6d6a
Files
-
0dc66c63bd8c0725dd93e960b65f21899bd4012761cc2046694a6c5e026f6d6a.exe windows:4 windows x64 arch:x64
1275ac8345a1628718b31dc229dd8822
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
cfgmgr32
CM_Locate_DevNodeA
CM_Reenumerate_DevNode
mscms
UninstallColorProfileA
InstallColorProfileA
setupapi
SetupDiEnumDeviceInfo
SetupCopyOEMInfA
SetupDiGetDeviceInstanceIdA
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiRemoveDevice
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
SHDeleteKeyA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
newdev
UpdateDriverForPlugAndPlayDevicesA
kernel32
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetModuleFileNameW
WritePrivateProfileStringA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
InitializeCriticalSection
TlsAlloc
GlobalReAlloc
GlobalHandle
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
FileTimeToSystemTime
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
RtlLookupFunctionEntry
RtlUnwindEx
GetSystemTimeAsFileTime
HeapReAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
RaiseException
RtlPcToFileHeader
HeapSize
GetACP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
RtlVirtualUnwind
SetHandleCount
GetStdHandle
GetFileType
HeapSetInformation
SetEndOfFile
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
lstrcpyA
GetModuleFileNameA
lstrcatA
CloseHandle
Sleep
GetExitCodeThread
CreateThread
SetCurrentDirectoryA
GetCurrentDirectoryA
lstrlenA
DeleteFileA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
GetSystemDirectoryA
CreateDirectoryA
GetLastError
SetLastError
FindClose
GetPrivateProfileSectionA
FindNextFileA
FindFirstFileA
WaitForSingleObject
LocalFree
GetTempPathA
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateProcess
HeapCreate
GetExitCodeProcess
OpenProcess
Process32Next
lstrcmpiA
Process32First
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcmpW
GlobalFree
MulDiv
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
lstrcmpA
MoveFileExA
SetFilePointer
GetFileTime
CompareFileTime
RemoveDirectoryA
GetProcessHeap
HeapAlloc
HeapFree
GetCurrentProcess
CreateFileA
GetFileSize
ReadFile
WriteFile
lstrcpynA
FormatMessageA
GetUserDefaultLangID
GetVersionExA
GetModuleHandleA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
GetPrivateProfileStringA
GlobalLock
GlobalAlloc
GlobalUnlock
ExitThread
TerminateThread
GetCurrentProcessId
CreateToolhelp32Snapshot
GetDriveTypeA
CreateProcessA
user32
LoadCursorA
UnregisterClassA
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetForegroundWindow
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
CopyRect
AdjustWindowRectEx
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
SendMessageA
GetWindowRect
SetTimer
EnableWindow
KillTimer
SendNotifyMessageA
GetWindow
GetWindowTextA
GetClassNameA
EnumChildWindows
GetTopWindow
MessageBoxA
DrawIcon
IsIconic
GetWindowTextLengthA
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetMenuState
PostMessageA
PostQuitMessage
ExitWindowsEx
RegisterDeviceNotificationA
wsprintfA
CharUpperA
SetWindowTextA
GetMenu
GetMenuItemCount
GetMenuStringA
GetMenuItemID
GetClientRect
InvalidateRect
LoadIconA
GetSystemMetrics
UnregisterDeviceNotification
GetWindowThreadProcessId
GetKeyState
GetSubMenu
DrawMenuBar
ModifyMenuA
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
GetPrinterA
OpenPrinterA
SetPrinterA
EnumPortsA
DeletePrinter
DocumentPropertiesA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
ChangeServiceConfigA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
StartServiceA
CloseServiceHandle
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 305KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ