Static task
static1
Behavioral task
behavioral1
Sample
0a0252ed72cdd12fb359df7d169b4a6c935ac13c47dc22fde0b563b46a76f93a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0a0252ed72cdd12fb359df7d169b4a6c935ac13c47dc22fde0b563b46a76f93a.exe
Resource
win10v2004-20240419-en
General
-
Target
0a0252ed72cdd12fb359df7d169b4a6c935ac13c47dc22fde0b563b46a76f93a
-
Size
204KB
-
MD5
352b43d4384c4c1022125ec5479a2960
-
SHA1
c1195a39db87e4281ebc737d4af4d5aab8e080c2
-
SHA256
0a0252ed72cdd12fb359df7d169b4a6c935ac13c47dc22fde0b563b46a76f93a
-
SHA512
75c1b66b37780d83aa293894f25c97f7b0b4eb8f50de83ee4047467d044d37f9db783025656699cd758f2cfd5b653f8d0bcae394d1210420637abc10bbd9f8ec
-
SSDEEP
3072:mWiaNiejtN+sQPvC7f4e4oG6Zx+pz0uJF:aLkd7f4e6JF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a0252ed72cdd12fb359df7d169b4a6c935ac13c47dc22fde0b563b46a76f93a
Files
-
0a0252ed72cdd12fb359df7d169b4a6c935ac13c47dc22fde0b563b46a76f93a.exe windows:4 windows x64 arch:x64
d702c1f684b4ec09f4fc6cee6f2566b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CompareFileTime
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
GetCommandLineW
GetCurrentDirectoryW
GetDateFormatW
GetEnvironmentVariableW
GetFileAttributesW
GetFileTime
GetFullPathNameW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetStdHandle
GetTickCount
GetTimeFormatW
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrW
LocalFree
ReadFile
SetFileAttributesW
SystemTimeToFileTime
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsdup
_wfopen
_wsplitpath
_wtol
exit
fclose
feof
fgetws
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcpy
strcspn
strlen
toupper
wcschr
wcscpy
wcsrchr
wcsstr
user32
CharUpperBuffW
LoadStringW
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE