Static task
static1
Behavioral task
behavioral1
Sample
0bb6e2a13de4db09dc7cbd121641d36354cb70f0b7f238e4618e9d417656efea.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
0bb6e2a13de4db09dc7cbd121641d36354cb70f0b7f238e4618e9d417656efea.exe
Resource
win11-20240709-en
General
-
Target
0bb6e2a13de4db09dc7cbd121641d36354cb70f0b7f238e4618e9d417656efea
-
Size
837KB
-
MD5
de2786daeb3f25af88293720009c830a
-
SHA1
f444abafd2bd20ef60f28b031ea73117face5dc8
-
SHA256
0bb6e2a13de4db09dc7cbd121641d36354cb70f0b7f238e4618e9d417656efea
-
SHA512
8bac198d53a94d12272f063e0721925b682d07c71fc379b6ed535f7bd64a91367013b892068de1e7a5b0d321be5550f5cf61882e5fdd7331c58e46567a18bab6
-
SSDEEP
12288:qrxlclEdmotheuXQt1P42ctLBhIpMno22Bg49ib6ugeqRpaYQVzXd3H8mXFAYaMW:AAEIR42cZBh8bDgGuge6aYuXdXt1Dc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bb6e2a13de4db09dc7cbd121641d36354cb70f0b7f238e4618e9d417656efea
Files
-
0bb6e2a13de4db09dc7cbd121641d36354cb70f0b7f238e4618e9d417656efea.exe windows:5 windows x86 arch:x86
694d481161f15a3a50297f304cce5a11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
IsBadWritePtr
IsBadStringPtrA
GlobalUnlock
GetLastError
SetLastError
GetProcAddress
CreateJobSet
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
CreateEventW
HeapLock
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
GetCurrentDirectoryA
GetFileTime
GetCurrentThreadId
Module32NextW
GetDiskFreeSpaceExW
TerminateJobObject
DebugBreak
CreateFileW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
MultiByteToWideChar
SetFilePointer
RtlUnwind
GetCPInfo
GetACP
IsValidCodePage
WideCharToMultiByte
HeapSize
HeapReAlloc
SetStdHandle
LCMapStringW
GetStringTypeW
GetConsoleCP
RaiseException
user32
GetKeyboardLayout
CharUpperBuffA
SetCursorPos
LoadMenuW
GetSysColorBrush
GetSystemMetrics
SetCaretPos
GetMessageTime
Sections
.text Size: 637KB - Virtual size: 636KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 147KB - Virtual size: 28.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yotazi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bakudo Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ