Static task
static1
Behavioral task
behavioral1
Sample
6c8a2d308c342353abfb595d4621f55ed8ef57016b579327a55a4d4c0a20e0a7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6c8a2d308c342353abfb595d4621f55ed8ef57016b579327a55a4d4c0a20e0a7.exe
Resource
win10v2004-20230221-en
General
-
Target
6c8a2d308c342353abfb595d4621f55ed8ef57016b579327a55a4d4c0a20e0a7
-
Size
1.3MB
-
MD5
896f775cb7c1e8fc54656c036d243702
-
SHA1
218ff58142e126932d2a671973ba396416b2313d
-
SHA256
6c8a2d308c342353abfb595d4621f55ed8ef57016b579327a55a4d4c0a20e0a7
-
SHA512
3a536407526136f14b8b6ff0097c6d128950b5799ef24be43f54303a6f995947d62c3027c669a37f6f204a7c64e3b6bfb84355f45a10d164a18a5207700c7f9d
-
SSDEEP
24576:5sxLb8VGJd2lOT6zAlMHoxpLQpLzjeDqTRCPaQ:SxLb4qd2loMH4p8pLz5tCPaQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c8a2d308c342353abfb595d4621f55ed8ef57016b579327a55a4d4c0a20e0a7
Files
-
6c8a2d308c342353abfb595d4621f55ed8ef57016b579327a55a4d4c0a20e0a7.exe windows x86
b4bfa3aff9a36d23a4bd4026f5974345
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesW
GetFullPathNameW
FindNextFileW
FindFirstFileW
FindClose
GetShortPathNameW
IsBadReadPtr
lstrlenW
lstrcpynW
LoadLibraryExW
GetModuleHandleW
VirtualProtect
GetVersionExW
GetProcessId
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
GetSystemDirectoryW
GetStartupInfoW
CreateProcessW
TerminateProcess
FindAtomW
GetCurrentProcess
Sleep
AddAtomW
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
GetLastError
SetUnhandledExceptionFilter
RaiseException
CloseHandle
DecodePointer
OutputDebugStringW
DeleteFileW
GetCommandLineW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
MultiByteToWideChar
lstrcmpiW
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
DeleteAtom
CopyFileW
CreateThread
GetTickCount
GetLocalTime
OpenProcess
WaitForMultipleObjects
CreateFileW
ExpandEnvironmentStringsW
WideCharToMultiByte
CreateEventW
SetEvent
MoveFileExW
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
FreeLibrary
FindResourceExW
GetStdHandle
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
CreateMutexW
GetModuleHandleExW
FreeLibraryAndExitThread
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
ExitThread
QueryPerformanceFrequency
GetFileAttributesExW
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetStringTypeW
FormatMessageW
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ReleaseMutex
DeviceIoControl
lstrcmpA
lstrcmpiA
CreateFileA
InterlockedCompareExchange
FreeResource
GetSystemWindowsDirectoryW
InterlockedIncrement
InterlockedDecrement
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetFileSizeEx
ReadFile
SetFilePointer
GetACP
GetFileSize
SetEndOfFile
WriteFile
UnhandledExceptionFilter
QueryPerformanceCounter
FlushFileBuffers
RtlUnwind
user32
SetWindowTextW
SendMessageW
SendMessageTimeoutW
PeekMessageW
DispatchMessageW
GetMessageW
SystemParametersInfoW
EnumDisplaySettingsW
ChangeDisplaySettingsW
ShowWindow
wsprintfW
GetWindowThreadProcessId
GetShellWindow
FindWindowW
PostQuitMessage
RegisterWindowMessageW
GetWindowLongW
KillTimer
SetTimer
DestroyWindow
CallWindowProcW
PostMessageW
LoadCursorW
FindWindowExW
SetWindowLongW
CharNextW
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
DefWindowProcW
TranslateMessage
advapi32
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
SetTokenInformation
GetLengthSid
CreateWellKnownSid
LookupPrivilegeValueW
DuplicateTokenEx
AdjustTokenPrivileges
RegFlushKey
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegGetValueW
shell32
ShellExecuteW
SHCreateDirectoryExW
ord165
SHGetFolderPathW
ord680
ShellExecuteExW
SHGetSpecialFolderPathW
SHChangeNotify
ole32
CoTaskMemRealloc
CoUninitialize
CoCreateGuid
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
VariantChangeType
VarUI4FromStr
shlwapi
PathFileExistsW
PathCombineW
PathRemoveFileSpecW
wnsprintfW
ord176
SHSetValueW
SHGetValueW
PathQuoteSpacesW
StrCpyW
StrStrIW
SHGetValueA
SHSetValueA
StrCmpNIW
StrTrimA
StrStrIA
StrCmpIW
PathIsDirectoryW
PathAppendW
comctl32
InitCommonControlsEx
gdiplus
GdiplusStartup
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
secur32
GetUserNameExW
iphlpapi
GetAdaptersInfo
wininet
InternetGetConnectedState
crypt32
CertGetNameStringW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
Sections
.text Size: 560KB - Virtual size: 559KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 154KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 610KB - Virtual size: 610KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ