Static task
static1
Behavioral task
behavioral1
Sample
opdirdel.exe
Resource
win11-20241007-en
General
-
Target
opdirdel.exe
-
Size
104KB
-
MD5
b47f24a14ba278dd069868619558f237
-
SHA1
e1c076724aeebfb54c1bbefda867ae672f8075ad
-
SHA256
1222dd20dbc702d9a07b79a19f038d30302753e8f6399281920e6d635b3b7ac2
-
SHA512
1bf07f1e6a21f069e464bfbd1c9d3a81e412107e880f1cade58ea4b7183d56f9bb23b7394a79e35eb7bce81588c7c43f5c3a1110dda6aec390f15f55059e354d
-
SSDEEP
1536:YuoJTFfXqHLTcX0iY7kCFiAAkfwnzplNy6IeaKiX5z:No9Vib7tFiAoVb6Kip
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource opdirdel.exe
Files
-
opdirdel.exe.exe windows:4 windows x86 arch:x86
0881dc821414451d3ba661646031f53f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetLastError
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
FindNextFileA
GetCommandLineA
GetCurrentProcess
CompareStringW
CompareStringA
SetStdHandle
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
SetLastError
lstrcpyA
LocalFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcpynA
GetVersion
LocalAlloc
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcmpA
GetModuleFileNameA
CloseHandle
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
LoadLibraryA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
SetEnvironmentVariableA
HeapSize
WriteFile
SetFilePointer
FlushFileBuffers
GetFullPathNameA
RtlUnwind
FindClose
ExitProcess
RaiseException
HeapAlloc
HeapFree
GetTimeZoneInformation
GetACP
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetDriveTypeA
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
gdi32
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
SetTextColor
GetClipBox
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
ord17
user32
GetSubMenu
GetMenuItemCount
LoadStringA
UnhookWindowsHookEx
EnableWindow
MessageBoxA
SendMessageA
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
PeekMessageA
CallNextHookEx
GetKeyState
DispatchMessageA
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetDlgCtrlID
GetWindowTextA
GetDlgItem
GetMenuItemID
PostMessageA
LoadIconA
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
ReleaseDC
GetDC
SetWindowTextA
LoadCursorA
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
DrawTextA
TabbedTextOutA
GrayStringA
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE