Static task
static1
Behavioral task
behavioral1
Sample
0a7e6778076d5adc2dc4fd08eb7dbce8d5af87997cfe7a1c7bebf0fa47b78a7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a7e6778076d5adc2dc4fd08eb7dbce8d5af87997cfe7a1c7bebf0fa47b78a7f.exe
Resource
win10v2004-20240802-en
General
-
Target
0a7e6778076d5adc2dc4fd08eb7dbce8d5af87997cfe7a1c7bebf0fa47b78a7f
-
Size
112KB
-
MD5
01125ec9eb9a5f7245929df9c8dcf1ad
-
SHA1
c55e38c04b5ae17db7c2e0eb13020678180e84e0
-
SHA256
0a7e6778076d5adc2dc4fd08eb7dbce8d5af87997cfe7a1c7bebf0fa47b78a7f
-
SHA512
4e46760c22e76cdb0609038edc1794271c061f695339a275b15ad7d1cb6d9cf8500bd48cd18107d4d8fc30135b875636ae029b7dec90cb1ded222e10240b89ab
-
SSDEEP
1536:bl14rQcWAkN7GAlqbkfAGQGV8aMbrNyrf1w+noPv6eBsCXKTnP:RmZWXyaiedMbrN6pnoXvBsZP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7e6778076d5adc2dc4fd08eb7dbce8d5af87997cfe7a1c7bebf0fa47b78a7f
Files
-
0a7e6778076d5adc2dc4fd08eb7dbce8d5af87997cfe7a1c7bebf0fa47b78a7f.exe windows:5 windows x86 arch:x86
08f6a1b121da8cedde2d1089d0906ed8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellAboutW
msvcrt
__CxxFrameHandler
_CxxThrowException
wcstoul
toupper
wcschr
memmove
wcslen
_wcsrev
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_controlfp
_except_handler3
?terminate@@YAXXZ
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalCompact
GlobalAlloc
GlobalFree
GlobalReAlloc
lstrcmpW
Sleep
WriteProfileStringW
GetStartupInfoA
GlobalSize
GlobalUnlock
CreateEventW
CreateThread
ResetEvent
lstrcpynW
SetEvent
WaitForSingleObject
CloseHandle
lstrcatW
lstrlenW
LocalReAlloc
LocalFree
LocalAlloc
GetProfileStringW
GlobalLock
GetCommandLineW
lstrcpyW
GetProfileIntW
gdi32
SetBkColor
SetTextColor
SetBkMode
user32
GetMenu
SetDlgItemInt
GetWindowTextW
CheckDlgButton
HideCaret
CallWindowProcW
DrawTextW
WinHelpW
PostQuitMessage
GetDlgCtrlID
ScreenToClient
ChildWindowFromPoint
DefWindowProcW
IsClipboardFormatAvailable
EnableMenuItem
TrackPopupMenuEx
GetDesktopWindow
OpenClipboard
GetClipboardData
CharNextA
CloseClipboard
GetSysColor
DialogBoxParamW
EndDialog
MessageBeep
GetSubMenu
CheckRadioButton
SetWindowTextW
SetFocus
SetCursor
CharNextW
RegisterClassExW
GetSysColorBrush
LoadCursorW
LoadIconW
InvalidateRect
UpdateWindow
ShowWindow
SendMessageW
SetDlgItemTextW
CheckMenuItem
CheckMenuRadioItem
SetWindowPos
OffsetRect
MapWindowPoints
GetClientRect
EnableWindow
LoadMenuW
SetWindowLongW
GetWindowLongW
CreateDialogParamW
GetDlgItem
DestroyMenu
DestroyWindow
SetMenu
GetWindowRect
SystemParametersInfoW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
IsChild
IsDialogMessageW
GetMessageW
LoadAcceleratorsW
CreateWindowExW
MessageBoxW
LoadStringW
SetProcessDefaultLayout
GetProcessDefaultLayout
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA