Static task
static1
Behavioral task
behavioral1
Sample
b0e5a03b92970a2de195e34c53ef4f80e02208be2ef1e9775c75dc17f22d8bc5.exe
Resource
win7-20240903-en
General
-
Target
b0e5a03b92970a2de195e34c53ef4f80e02208be2ef1e9775c75dc17f22d8bc5.exe
-
Size
357KB
-
MD5
d02dbae252dba0a0f0ea5ed9032d41cf
-
SHA1
fa6fb7a1c5dc84d81809c200750094eadbf38e1e
-
SHA256
b0e5a03b92970a2de195e34c53ef4f80e02208be2ef1e9775c75dc17f22d8bc5
-
SHA512
3ebd3b9a48f1c7580111f8b6f44834ccfefbb1f8e66217661d0bffcba4eeac2c309236bb2971703c83c015584a7563653e27b266d50fc84fbd05a8bf83667a67
-
SSDEEP
6144:A0jY0jskbqkwDrooNz3+hBkqYB0Mv/KHFLC2FfeQ7qF1FrVOVb/F0jDDu0jS:A0jY0jFHwAkzkmRB0iKtC2FcF1fOVbtD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0e5a03b92970a2de195e34c53ef4f80e02208be2ef1e9775c75dc17f22d8bc5.exe
Files
-
b0e5a03b92970a2de195e34c53ef4f80e02208be2ef1e9775c75dc17f22d8bc5.exe.exe windows:4 windows x86 arch:x86
2188232803ce11f32b237a747a49a40e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetLastError
GetModuleHandleA
LocalAlloc
InterlockedExchange
LoadLibraryA
RaiseException
GetStartupInfoA
GetLongPathNameW
GetFullPathNameW
FindClose
FindFirstFileW
FreeLibrary
FormatMessageW
VirtualFree
GetSystemTimeAsFileTime
CopyFileW
lstrcpyW
OutputDebugStringW
SetFilePointer
GetModuleFileNameW
GetEnvironmentVariableW
LocalFree
GlobalAlloc
GlobalFree
CreateMutexW
CloseHandle
UnmapViewOfFile
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
ReadFile
WriteFile
GetVersionExW
lstrlenW
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
lstrcmpW
ExitProcess
GetCurrentThreadId
GetCommandLineW
GlobalLock
GlobalUnlock
FlushInstructionCache
GetCurrentProcess
GetProcAddress
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetSystemInfo
SleepEx
SetEndOfFile
LoadLibraryW
GetProcessIoCounters
GetProcessTimes
FindFirstVolumeMountPointW
SetVolumeMountPointA
GetConsoleAliasesA
WriteConsoleOutputCharacterW
GetCurrencyFormatW
DnsHostnameToComputerNameA
GetConsoleTitleW
UnlockFile
GetHandleInformation
lstrcmpiW
GetProcessAffinityMask
GetFileType
BackupSeek
GetTempFileNameA
SetFileAttributesA
GetPrivateProfileStringW
EnumTimeFormatsW
GetTimeZoneInformation
BackupRead
ReadFileEx
FindFirstChangeNotificationW
VirtualQueryEx
GetTickCount
LocalCompact
GetFileTime
LocalUnlock
CreateFileA
GetLocalTime
GetSystemTime
InitializeCriticalSection
DeleteCriticalSection
TerminateThread
InterlockedIncrement
CreateMutexA
CreatePipe
GetTempPathA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
SetStdHandle
GetCommandLineA
lstrcmpiA
Sleep
CreateEventA
CreateThread
WaitForSingleObject
InterlockedDecrement
ReleaseMutex
SetEvent
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
RtlUnwind
GetVersion
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
IsBadWritePtr
GetStringTypeA
GetStringTypeW
GetCurrentProcessId
user32
ReleaseCapture
LoadCursorW
LoadCursorFromFileA
EndDialog
ShowWindow
GetParent
wsprintfW
SetWindowLongW
RemovePropW
GetPropW
SetPropW
DialogBoxParamW
GetDlgItem
OpenClipboard
PostMessageW
CloseClipboard
EmptyClipboard
SetClipboardData
SendMessageW
FindWindowW
MessageBoxW
SetWindowTextW
LoadImageW
LoadIconW
CallMsgFilter
DeferWindowPos
DdeAbandonTransaction
IsWindow
RegisterDeviceNotificationA
CharLowerA
GetKeyboardLayoutList
RegisterClassExA
AnyPopup
GetMenu
SetWindowPos
EndPaint
GetDlgItemTextA
MessageBoxA
GetDlgCtrlID
GetWindowLongA
SetWindowTextA
SendDlgItemMessageA
DialogBoxParamA
PostThreadMessageA
CharNextA
SetWindowLongA
EnableWindow
BeginPaint
SendMessageA
DispatchMessageA
GetMessageA
gdi32
GetEnhMetaFileBits
GetStockObject
CreateFontIndirectA
GetClipBox
CreateHalftonePalette
GetETM
Polygon
GetDIBColorTable
SetWinMetaFileBits
CreateEllipticRgn
CreateICA
PATHOBJ_vEnumStart
RemoveFontMemResourceEx
BeginPath
SelectFontLocal
GdiInitializeLanguagePack
GetCharWidthFloatA
ExtFloodFill
GetTextCharacterExtra
GetTextExtentExPointA
WidenPath
GdiEndPageEMF
AddFontMemResourceEx
CLIPOBJ_bEnum
GetLogColorSpaceA
advapi32
RegOpenKeyW
RegQueryValueExA
GetUserNameA
shell32
SHGetFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
ShellExecuteW
DuplicateIcon
SHBrowseForFolderW
ShellAboutW
SHInvokePrinterCommandW
WOWShellExecute
ole32
OleUninitialize
CoTaskMemFree
CoRevokeClassObject
OleInitialize
CoResumeClassObjects
CoRegisterClassObject
CoCreateInstance
CLSIDFromProgID
CoDisconnectObject
CoInitialize
CoUninitialize
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
PathFindExtensionW
StrCmpIW
PathFindFileNameW
StrCmpNW
PathStripToRootW
PathIsRootW
PathIsUNCW
PathRemoveBackslashW
StrChrIW
StrCmpNIW
StrStrIA
comctl32
InitCommonControlsEx
PropertySheetW
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 341B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 271KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ