Static task
static1
Behavioral task
behavioral1
Sample
0dc6c8e86db7c4b2b89037e0830c0a9ecff8e72ed05b642bf86e917d269b4186.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dc6c8e86db7c4b2b89037e0830c0a9ecff8e72ed05b642bf86e917d269b4186.exe
Resource
win10v2004-20240802-en
General
-
Target
0dc6c8e86db7c4b2b89037e0830c0a9ecff8e72ed05b642bf86e917d269b4186
-
Size
349KB
-
MD5
c23f0d3089cea34d937d2da578c556d1
-
SHA1
c2c40cdf266c7b00893e64e160fa46f7cf848121
-
SHA256
0dc6c8e86db7c4b2b89037e0830c0a9ecff8e72ed05b642bf86e917d269b4186
-
SHA512
60991cd8b9b1645da414ac0ae89fb2388b3100916b01dd9eb4280c6c716daa0b21f25b0496f3257c30bde0fe578ab1e46ec1bd987a44bc2c6bab16ee0ba42244
-
SSDEEP
768:oo4g0a6iqSbyS3S6fgUkyNTwyQ0pQwCQbMt0lklqndZkt8zSBfwq+b5HO1+N3Qi/:bZtg6NTwyQiQJQot0l9FO1+ZQ8nR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dc6c8e86db7c4b2b89037e0830c0a9ecff8e72ed05b642bf86e917d269b4186
Files
-
0dc6c8e86db7c4b2b89037e0830c0a9ecff8e72ed05b642bf86e917d269b4186.exe windows:6 windows x64 arch:x64
4c219be2beee040d4ccaedd4ea2e74a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mfc140u
ord3812
ord3279
ord3278
ord3172
ord11850
ord5582
ord5916
ord9946
ord6251
ord990
ord4095
ord3164
ord8826
ord6588
ord8830
ord6303
ord286
ord2187
ord2212
ord3599
ord3697
ord7235
ord13767
ord4335
ord3212
ord10163
ord2149
ord878
ord1369
ord10727
ord14128
ord6287
ord8901
ord8926
ord11855
ord2697
ord13397
ord6000
ord3071
ord3307
ord3308
ord11085
ord10704
ord8731
ord11813
ord306
ord1034
ord13401
ord6002
ord3056
ord4078
ord450
ord8167
ord8084
ord12544
ord8023
ord5183
ord11806
ord12222
ord12223
ord14210
ord7650
ord14216
ord11944
ord4011
ord3949
ord12625
ord7668
ord2011
ord11664
ord11665
ord14088
ord12212
ord7719
ord5723
ord6121
ord14290
ord6123
ord14289
ord6122
ord3731
ord5706
ord11921
ord11929
ord4445
ord7920
ord10124
ord11933
ord11901
ord12606
ord5080
ord5363
ord5552
ord9041
ord5339
ord5555
ord5083
ord5229
ord5062
ord7460
ord7461
ord7450
ord5227
ord7922
ord9941
ord8900
ord6614
ord1091
ord6250
ord6320
ord3756
ord296
ord4656
ord2270
ord1089
ord1033
ord1111
ord1424
ord1053
ord2439
ord2629
ord3951
ord13545
ord13513
ord3173
ord8947
ord10691
ord6729
ord11902
ord8656
ord14209
ord11625
ord3718
ord11771
ord8817
ord11415
ord11414
ord7054
ord13109
ord940
ord1489
ord2178
ord7716
ord1450
ord983
ord7393
ord5451
ord9979
ord13354
ord11406
ord6631
ord9975
ord9977
ord14217
ord7651
ord14211
ord9978
ord2967
ord4352
ord9384
ord4360
ord4828
ord4767
ord4752
ord4814
ord4859
ord4782
ord4837
ord9976
ord14360
ord4853
ord4794
ord4800
ord4806
ord4788
ord4843
ord4776
ord1755
ord1734
ord1748
ord1722
ord1700
ord2698
ord14288
ord11940
ord7913
ord9089
ord3209
ord10070
ord13864
ord2370
ord1491
kernel32
GetModuleFileNameA
CreateFileA
CloseHandle
WriteFile
SetPriorityClass
GetCurrentProcess
ExitProcess
GetCurrentThread
GetProcAddress
OutputDebugStringW
InitializeCriticalSectionEx
SetThreadPriority
GetLastError
DeleteCriticalSection
TerminateProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
user32
SendMessageW
DrawIcon
GetClientRect
GetSystemMetrics
EnableWindow
IsIconic
MessageBoxA
LoadIconW
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
ws2_32
connect
WSAStartup
htons
inet_addr
socket
send
WSACleanup
closesocket
recv
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_copy
__std_exception_destroy
memset
__current_exception
__current_exception_context
memmove
__C_specific_handler
_CxxThrowException
memcpy
api-ms-win-crt-runtime-l1-1-0
_cexit
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
__p__pgmptr
_register_thread_local_exe_atexit_callback
_c_exit
_invalid_parameter_noinfo_noreturn
_seh_filter_exe
_exit
exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
_set_app_type
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf_s
__stdio_common_vsprintf
__p__commode
_set_fmode
api-ms-win-crt-heap-l1-1-0
malloc
_set_new_mode
free
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.u3d Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ