Static task
static1
Behavioral task
behavioral1
Sample
0f38edbf83ba0f3293348a875272bf50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0f38edbf83ba0f3293348a875272bf50N.exe
Resource
win10v2004-20240709-en
General
-
Target
0f38edbf83ba0f3293348a875272bf50N.exe
-
Size
7.8MB
-
MD5
0f38edbf83ba0f3293348a875272bf50
-
SHA1
62d1bad5a6639879ea911c87ded1fd4f8a314130
-
SHA256
1b120f48761837a08fd5790e138efcf4de7cf8150d0a457199ea933eca7d1696
-
SHA512
0aa4ddf3d2fd8ab79c401b30a2da4464b90ebdfd92e905fab030c32765a73887b18f14bfe617549f6ad5826a19bc933a541565fbbcfca7f05d4b109c7ca13081
-
SSDEEP
196608:W288p8RT3OgtMwVajd4nXhE7OUGCZvb+CV4i8JRzY6SK:W288+T3O6I2nXhE7OUGClb+CV4vD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f38edbf83ba0f3293348a875272bf50N.exe
Files
-
0f38edbf83ba0f3293348a875272bf50N.exe.exe windows:6 windows x86 arch:x86
3edeaff8abef40c004b6f29fa270bade
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
LCMapStringW
SetStdHandle
FindClose
VirtualAlloc
TlsFree
GetTickCount
SetEvent
MoveFileExW
EnterCriticalSection
CreateFileW
GetCurrentDirectoryA
GetProcessAffinityMask
FindFirstFileW
SetLastError
GetProcAddress
FindNextFileW
SetFileAttributesW
GetSystemDirectoryW
GetModuleHandleW
HeapReAlloc
FormatMessageW
SetCurrentDirectoryW
RemoveDirectoryA
FreeEnvironmentStringsW
GetFileSize
UnhandledExceptionFilter
LoadLibraryA
ReadFile
WideCharToMultiByte
WakeAllConditionVariable
FreeLibraryAndExitThread
GetTempPathW
WriteConsoleW
GetACP
ReleaseSemaphore
TryAcquireSRWLockExclusive
HeapAlloc
SetFilePointerEx
CreateThread
TlsSetValue
GetCurrentThreadId
LocalFree
WaitForSingleObject
GetSystemInfo
IsProcessorFeaturePresent
GetVersionExA
TlsGetValue
LeaveCriticalSection
FindNextFileA
GlobalMemoryStatus
CloseHandle
CreateDirectoryA
GetFileType
CreateFileA
VirtualFree
HeapSize
GetCurrentDirectoryW
GetCurrentProcess
RaiseException
FindFirstFileA
GetModuleFileNameW
IsDebuggerPresent
QueryPerformanceFrequency
GetEnvironmentStringsW
LoadLibraryExW
SetCurrentDirectoryA
DeleteCriticalSection
GetProcessHeap
GetModuleFileNameA
GetCPInfo
CreateSemaphoreA
GetCommandLineA
SetUnhandledExceptionFilter
FreeLibrary
GetConsoleMode
RemoveDirectoryW
RtlUnwind
GetFileAttributesA
AcquireSRWLockExclusive
GetFileInformationByHandle
DeleteFileW
FlushFileBuffers
GetTickCount64
FindFirstFileExA
SetFilePointer
GetLastError
QueryPerformanceCounter
GetModuleHandleA
EncodePointer
InitializeCriticalSection
GetCurrentProcessId
LoadLibraryW
SetFileAttributesA
AreFileApisANSI
DecodePointer
GetModuleHandleExW
SetFileTime
CreateEventA
CreateDirectoryW
CreateProcessA
SetEndOfFile
ExitProcess
ResetEvent
IsBadReadPtr
DeleteFileA
IsValidCodePage
GetTempPathA
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
TerminateProcess
InitializeCriticalSectionEx
GetFileAttributesW
HeapFree
GetTempFileNameW
FormatMessageA
Sleep
GetOEMCP
WriteFile
GetStdHandle
GetVersion
GetCommandLineW
TlsAlloc
GetConsoleCP
GetStringTypeW
MultiByteToWideChar
InitializeSListHead
ExitThread
InitializeCriticalSectionAndSpinCount
user32
DialogBoxParamA
CharUpperW
LoadStringA
LoadIconA
SetWindowTextA
CharUpperA
KillTimer
GetDlgItem
DialogBoxParamW
EndDialog
MessageBoxA
GetWindowLongA
SetTimer
ShowWindow
LoadStringW
SetWindowLongA
MessageBoxW
SendMessageA
PostMessageA
DestroyWindow
SetWindowTextW
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
advapi32
CloseServiceHandle
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 570KB - Virtual size: 582KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ