Static task
static1
Behavioral task
behavioral1
Sample
0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517.exe
Resource
win10v2004-20241007-en
General
-
Target
0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517
-
Size
266KB
-
MD5
b611b18150ff90f659198e46c7f2b74f
-
SHA1
bb6bcaf535bddc8b793a8fa890bbbe7a33290faa
-
SHA256
0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517
-
SHA512
7d934c5875b9f984a1ff5576a4a3dd357a2f1ce54c282cae3a71a57415ad75ac570b0b7e02b32672c7f0bbb7b20f22438ab3765f033c0ee61cfb246bc6fe2b0e
-
SSDEEP
6144:ty72/oopck5kxnvEL3T0Lq5TmSqMLMHgo2TWnF+v:tyQoomYEg9qrHgo2anAv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517
Files
-
0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517.exe windows:6 windows x64 arch:x64
32fbf5b10b16ec517b227ff71a382b38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
VariantClear
kernel32
EnumSystemLocalesEx
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
LoadLibraryExW
ReadConsoleW
SetStdHandle
WriteConsoleW
OutputDebugStringW
LocalFree
GetTickCount64
SetEndOfFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetThreadContext
GetTempFileNameW
GetFileSize
SetThreadContext
SetFilePointer
FreeLibrary
GetCurrentProcess
WaitForSingleObject
WriteFile
OpenProcess
GetSystemDirectoryW
LoadLibraryW
GetModuleFileNameW
CreateFileW
GetTempPathW
GetLastError
GetProcAddress
VirtualAllocEx
LoadLibraryA
GetModuleHandleA
lstrcatW
Wow64SetThreadContext
CloseHandle
WriteProcessMemory
ResumeThread
Wow64GetThreadContext
CreateThread
HeapAlloc
GetProcessHeap
Sleep
CreateRemoteThread
CreateToolhelp32Snapshot
VirtualProtectEx
VirtualProtect
ExitProcess
CreateMutexA
HeapReAlloc
CreateFileA
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
CompareFileTime
HeapFree
GetModuleHandleW
GetProcessTimes
GetFileAttributesA
TerminateProcess
ReadFile
lstrcatA
MultiByteToWideChar
CreateDirectoryA
CopyFileA
SetFileAttributesA
Process32FirstW
CreateFileMappingA
GetModuleFileNameA
Process32NextW
IsDebuggerPresent
FindNextFileW
DeleteFileW
ExpandEnvironmentStringsW
WideCharToMultiByte
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetLocaleInfoEx
GetCPInfo
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCommandLineW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
GetModuleHandleExW
HeapSize
IsValidCodePage
GetACP
GetOEMCP
SetLastError
GetCurrentThreadId
GetStdHandle
GetFileType
InitOnceExecuteOnce
GetStartupInfoW
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ