Static task
static1
Behavioral task
behavioral1
Sample
0181ed78e0852373ce9fa825997baf68.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0181ed78e0852373ce9fa825997baf68.exe
Resource
win10v2004-20240611-en
General
-
Target
0181ed78e0852373ce9fa825997baf68.bin
-
Size
268KB
-
MD5
0181ed78e0852373ce9fa825997baf68
-
SHA1
ba2f0a807befa94df71034185170d7ce2a32548d
-
SHA256
d21b4ac06d782bae26f5774d53317df08506ca9dedcbcf3e74e0370f54f6d4d0
-
SHA512
59a4209c4448733f049dfe978e40e131c30bd5bbbdd94afa6b0ea10c0bfc934d073734a15adbb8221dfe958be5065712a585d3774a1c891b7d3a8894a7d5b26e
-
SSDEEP
6144:im4NOmaeR6UG5fk072IRjPWh72fx3DmQdJkXdT1Bxm8:WOmpeRrRjqeaQdWdT1XN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0181ed78e0852373ce9fa825997baf68.bin
Files
-
0181ed78e0852373ce9fa825997baf68.bin.exe windows:4 windows x86 arch:x86
1e74618af5a4fcd494c5f314a068a070
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathAppendA
SHDeleteKeyA
PathFileExistsA
SHDeleteValueA
SHSetValueA
SHGetValueA
wininet
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
kernel32
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetFileAttributesA
GetFileTime
GlobalFlags
GetCurrentThreadId
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapFree
HeapAlloc
VirtualAlloc
TlsGetValue
HeapReAlloc
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetStdHandle
GetFileType
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetACP
GetTimeZoneInformation
GetDriveTypeA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LeaveCriticalSection
LocalAlloc
lstrcmpA
InterlockedDecrement
GetModuleHandleA
GlobalGetAtomNameA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
ReleaseSemaphore
CreateSemaphoreA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
DeleteFileA
ResumeThread
GetTempPathA
GetCurrentProcessId
CloseHandle
GetVersionExA
CreateMutexA
GetModuleFileNameA
LoadLibraryA
RemoveDirectoryA
GetProcAddress
SetLastError
CreateDirectoryA
SetThreadPriority
CreateProcessA
Sleep
WriteFile
GetSystemTimeAsFileTime
GetCurrentThread
WaitForSingleObject
GetCurrentProcess
SystemTimeToFileTime
FreeLibrary
SetPriorityClass
CreateFileA
GetComputerNameA
GetVersion
CompareStringA
LockResource
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
SizeofResource
WideCharToMultiByte
LoadResource
lstrlenA
FindResourceA
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
CharUpperA
SetMessageExtraInfo
DispatchMessageA
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageA
GetParent
DefWindowProcA
CreateWindowExA
MessageBoxA
TranslateMessage
RegisterWindowMessageA
wsprintfA
KillTimer
GetMessageExtraInfo
PostQuitMessage
SetTimer
GetMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextA
UnhookWindowsHookEx
GetSystemMetrics
gdi32
CreateBitmap
GetStockObject
DeleteDC
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegOpenKeyA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
SetSecurityDescriptorDacl
RegEnumKeyExA
InitializeSecurityDescriptor
RegDeleteKeyA
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoInitializeEx
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ