Static task
static1
Behavioral task
behavioral1
Sample
0c90d7ce16ad5a66e6ea8d6deee65fab486dfc31b304b80dd907751e51af8628.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0c90d7ce16ad5a66e6ea8d6deee65fab486dfc31b304b80dd907751e51af8628.exe
Resource
win10v2004-20240802-en
General
-
Target
0c90d7ce16ad5a66e6ea8d6deee65fab486dfc31b304b80dd907751e51af8628
-
Size
263KB
-
MD5
b8f26190f37263417a2a9d49953d4711
-
SHA1
265f54c08fea73777a1cefae86892114586dd6d6
-
SHA256
0c90d7ce16ad5a66e6ea8d6deee65fab486dfc31b304b80dd907751e51af8628
-
SHA512
8ea70594d41432264f9a7aadaad8ef1cc23da6f46004538556b077c2f98383fc392ac4e11cfd1046e896b1e765d72de43d1beafbd0e6192dad4d9cce8438be7c
-
SSDEEP
6144:HFx03FJPfTnDblS3+UXnHNoFt97Zaa0AFe4DOov:bGJznflSO4nHNoFf7lu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c90d7ce16ad5a66e6ea8d6deee65fab486dfc31b304b80dd907751e51af8628
Files
-
0c90d7ce16ad5a66e6ea8d6deee65fab486dfc31b304b80dd907751e51af8628.exe windows:5 windows x86 arch:x86
4e33f34802a5eda03a660f9739532d75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommState
InterlockedDecrement
GetCurrentProcess
GetLogicalDriveStringsW
InterlockedCompareExchange
SetVolumeMountPointW
GetModuleHandleW
CreateNamedPipeW
FindNextVolumeMountPointA
GetNumberFormatA
CreateActCtxW
TlsSetValue
SetFileShortNameW
LoadLibraryW
LocalShrink
GetLocaleInfoW
GetCalendarInfoA
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
CreateJobObjectA
VerifyVersionInfoW
InterlockedExchange
GlobalUnfix
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
EnumSystemCodePagesW
GetConsoleDisplayMode
SetComputerNameA
LoadModule
SetThreadPriorityBoost
GetConsoleAliasExesLengthA
GetFileType
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
CreateEventW
FoldStringW
SetEnvironmentVariableA
EnumDateFormatsA
GetProcessShutdownParameters
LoadLibraryExA
VirtualProtect
GetCurrentDirectoryA
GetFileTime
OpenEventW
SetCalendarInfoA
GetVersionExA
GetDiskFreeSpaceExW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
EnumCalendarInfoExA
LCMapStringW
CommConfigDialogW
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
IsValidCodePage
SetEndOfFile
GetConsoleAliasExesA
EnumCalendarInfoA
GlobalMemoryStatus
LocalAlloc
SetDefaultCommConfigA
GetOEMCP
GetACP
HeapFree
HeapAlloc
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapCreate
ExitProcess
WriteFile
GetStdHandle
Sleep
HeapSize
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetCPInfo
user32
CharUpperA
SetCaretPos
LoadMenuA
GetMenuStringW
DrawStateW
InsertMenuItemW
GetMenu
GetWindowLongW
gdi32
GetCharWidthFloatA
CreateDCA
GetCharWidth32A
GetTextMetricsA
GetBkMode
ole32
CoUnmarshalHresult
Sections
.text Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bekax Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bojek Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xezukev Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jenoli Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ