Static task
static1
Behavioral task
behavioral1
Sample
6f6e12567d41011e11473ee569ac32e3abdf0f0f3738caacd806db4e7ab88cca.exe
Resource
win7-20230220-en
General
-
Target
6f6e12567d41011e11473ee569ac32e3abdf0f0f3738caacd806db4e7ab88cca
-
Size
356KB
-
MD5
5910c0ac2d1b7c21213150dc2e0ebee1
-
SHA1
b7c3cef988b8cbaef92586bc3ccc91235f45db48
-
SHA256
6f6e12567d41011e11473ee569ac32e3abdf0f0f3738caacd806db4e7ab88cca
-
SHA512
c4d6a8961a0e6f41b05503f4edc369e08a1b82db5dad27a6a127139764b846eef4d679758ee75bdbef9a4f2ab722501a78d2e0b19613d84b6bc47024cb4c8e72
-
SSDEEP
6144:hx+8x3zntFj3OB0LPJQOZGhcvSSj2x+TGLNs3EtU7L:htLFTOAQIacvSS6oqLFtsL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6f6e12567d41011e11473ee569ac32e3abdf0f0f3738caacd806db4e7ab88cca
Files
-
6f6e12567d41011e11473ee569ac32e3abdf0f0f3738caacd806db4e7ab88cca.exe windows x86
c9f7e018b269f1b5fe81cf757d6f8e93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
LoadLibraryA
GetProcAddress
WriteFile
GlobalReAlloc
GlobalSize
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalAlloc
VirtualAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleExA
GetModuleHandleA
GetStartupInfoA
user32
GetMenu
GetDlgItem
CharLowerA
DestroyWindow
ShowWindow
WinHelpA
DefFrameProcA
EnableMenuItem
GetParent
DefMDIChildProcA
EndDialog
CharUpperA
ReleaseDC
GetDC
SendMessageA
InvalidateRect
PostQuitMessage
SendDlgItemMessageA
wsprintfA
SetWindowPos
GetClientRect
SetScrollRange
SetScrollPos
LoadStringA
EndPaint
BeginPaint
DispatchMessageA
TranslateMessage
GetMessageA
CreateDialogParamA
UpdateWindow
CreateWindowExA
RegisterClassA
LoadCursorA
DialogBoxParamA
LoadIconA
gdi32
CreatePalette
DeleteObject
SelectObject
RealizePalette
SelectPalette
SaveDC
SetWindowOrgEx
RestoreDC
LineTo
MoveToEx
DPtoLP
Rectangle
SetROP2
SetViewportExtEx
SetWindowExtEx
SetMapMode
CreatePen
GetStockObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBitmap
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
_ftol
strncpy
strncmp
calloc
memset
strcpy
strlen
strcmp
memcpy
malloc
__set_app_type
_controlfp
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ