t:\delivery\x86\ship\0\ose.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1a26c48487aa57f11f6b1c041a078a40.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1a26c48487aa57f11f6b1c041a078a40.exe
Resource
win10v2004-20240704-en
General
-
Target
1a26c48487aa57f11f6b1c041a078a40.exe
-
Size
701KB
-
MD5
1a26c48487aa57f11f6b1c041a078a40
-
SHA1
6bd9a67e68c7c6a0693f3acc52f3dc7d395f455b
-
SHA256
1d3095775e90d580e5633b4a8fab4c4e29527e00a69a215e4fcdde37b5f7272f
-
SHA512
49f98a8fee82500bad481bfe09a10d537cc7878846205e2b90899d712aed76fc7d1d89e0580c879487cecc4f87bc2c220f640c9f3dfcb2e9b65a6f68ae621b0d
-
SSDEEP
12288:NQR6HXxzcJsxDcaouKmZk3SPJ0Kpt91AfwQ8X2e/eVRlhwVQXGw/1+mgmwjjxo5:NQR6tmaouGSPGM9ZQ8GYelhwOXGEDgm6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a26c48487aa57f11f6b1c041a078a40.exe
Files
-
1a26c48487aa57f11f6b1c041a078a40.exe.exe windows:4 windows x86 arch:x86
e5a1bfe9d29ff6e7cdf0de13098a43c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
RegCloseKey
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
SetThreadToken
RegEnumValueW
RegQueryValueExW
RegNotifyChangeKeyValue
SetServiceStatus
StartServiceCtrlDispatcherW
DuplicateToken
RegDeleteValueW
RegisterServiceCtrlHandlerW
CryptDestroyHash
CryptCreateHash
CryptGetHashParam
CryptHashData
FreeSid
AllocateAndInitializeSid
LookupAccountNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CheckTokenMembership
OpenThreadToken
RegDeleteKeyW
SetFileSecurityW
CryptAcquireContextW
CryptReleaseContext
kernel32
GetLastError
GetModuleFileNameW
CloseHandle
SetEvent
lstrlenW
GetDriveTypeW
GetLogicalDrives
lstrcmpW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
Sleep
ExitProcess
InitializeCriticalSection
GetCommandLineW
GetTickCount
ReleaseMutex
ResetEvent
WaitForMultipleObjectsEx
SetErrorMode
CreateEventW
CreateMutexW
CreateProcessW
MoveFileExW
GetSystemInfo
CreateFileA
ReadFile
SetFilePointer
DosDateTimeToFileTime
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryW
WideCharToMultiByte
CreateFileW
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
CreateThread
CreateSemaphoreW
VirtualFree
VirtualAlloc
SetFilePointerEx
GetSystemTimeAsFileTime
CompareStringW
ExpandEnvironmentStringsW
SystemTimeToFileTime
GetSystemTime
SetFileTime
SetEndOfFile
WriteFile
LocalFree
lstrlenA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetFileSizeEx
FindClose
FindFirstFileW
GetFileAttributesW
CreateDirectoryW
GetTempPathW
GlobalFree
GlobalAlloc
GetFileAttributesExW
CopyFileW
CreateHardLinkW
SetFileAttributesW
DeleteFileW
GetTempPathA
GetFileTime
FindNextFileW
GetStdHandle
GetCurrentThread
RemoveDirectoryW
FormatMessageA
GetComputerNameW
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
LoadLibraryA
HeapReAlloc
RtlUnwind
GetLocaleInfoA
HeapSize
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
rpcrt4
RpcServerRegisterIfEx
RpcServerUseProtseqEpW
RpcServerUnregisterIf
RpcRevertToSelf
RpcImpersonateClient
NdrServerCall2
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
wininet
InternetSetFilePointer
InternetOpenUrlW
InternetCloseHandle
InternetReadFile
InternetOpenW
InternetGetConnectedState
InternetCanonicalizeUrlW
HttpQueryInfoW
wintrust
WinVerifyTrust
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE