Static task
static1
Behavioral task
behavioral1
Sample
0be60042c91cf82c811e15045a123ad0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0be60042c91cf82c811e15045a123ad0N.exe
Resource
win10v2004-20240709-en
General
-
Target
0be60042c91cf82c811e15045a123ad0N.exe
-
Size
68KB
-
MD5
0be60042c91cf82c811e15045a123ad0
-
SHA1
053add92df040cc9e88d37f105300d890eda7eae
-
SHA256
372f17d14b52875aca7eae898a9928e8b119fea495b6e4f6b8d96ae800e98d8b
-
SHA512
7743ab72e0e245059a0b91e328f46af4ce88335201572136e16cfb05fd593751da4745eeddeae497ad91ca120f5b053c6ef801175d76baca10fb3941076f8832
-
SSDEEP
1536:bZmaZq/m00tiCjJuPGw4jC7yO9eRiEctx:mzGJuuiyO95JX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0be60042c91cf82c811e15045a123ad0N.exe
Files
-
0be60042c91cf82c811e15045a123ad0N.exe.exe windows:4 windows x64 arch:x64
b9227207c4d4961e51addb180ad171e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
ord17
shlwapi
StrToIntW
StrToInt64ExW
kernel32
GetProcAddress
LoadLibraryExA
SetCurrentDirectoryA
SetCurrentDirectoryW
FreeLibrary
CloseHandle
ReadFile
WriteFile
GetCommandLineW
SetConsoleCtrlHandler
SetProcessShutdownParameters
GetSystemDirectoryW
ExitProcess
LocalFree
GetLastError
SetErrorMode
advapi32
FreeSid
GetNamedSecurityInfoA
AllocateAndInitializeSid
SetNamedSecurityInfoA
SetEntriesInAclW
shell32
CommandLineToArgvW
ole32
OleUninitialize
OleInitialize
oleaut32
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ