Static task
static1
Behavioral task
behavioral1
Sample
Malicious_690d30eb9ccdd3a1438a6f4d714c4b85962d5197d3b2ea899fec26c0a70231a9.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_690d30eb9ccdd3a1438a6f4d714c4b85962d5197d3b2ea899fec26c0a70231a9.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_690d30eb9ccdd3a1438a6f4d714c4b85962d5197d3b2ea899fec26c0a70231a9.exe
-
Size
64KB
-
MD5
6c61df45024b34108eec6a87ffddc5f2
-
SHA1
7b8ebb35e1f83b73d68f2f844bc56670b449bfdf
-
SHA256
690d30eb9ccdd3a1438a6f4d714c4b85962d5197d3b2ea899fec26c0a70231a9
-
SHA512
8445acd95fd4c599681dae2047cfd618eab3931c3c06aecf75c621a631674b29e3c106ab621b81ff1996c34d8f72b9d10b63bd04159700feef8ffa4e6069cb6c
-
SSDEEP
1536:uyXWwjY239rgUE9NSSUgW1jn4dPcxnOA7O2QUiIfN854nt2:uyGsY2JKo3vNnNpO0O2QUiIfN8540
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_690d30eb9ccdd3a1438a6f4d714c4b85962d5197d3b2ea899fec26c0a70231a9.exe
Files
-
Malicious_690d30eb9ccdd3a1438a6f4d714c4b85962d5197d3b2ea899fec26c0a70231a9.exe.exe windows x64
be80bdf22d9bcefc866901ead7ddbcb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateEventA
WaitForSingleObject
SetConsoleCtrlHandler
CreateProcessA
SetEvent
Sleep
TerminateProcess
GetCurrentProcess
GetCurrentProcessId
OpenProcess
CloseHandle
GetLastError
QueryDosDeviceA
FreeLibrary
LoadLibraryA
GetModuleFileNameA
GetProcAddress
MultiByteToWideChar
HeapAlloc
HeapFree
GetCommandLineA
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
HeapSetInformation
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapReAlloc
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
advapi32
StartServiceA
ControlService
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateServiceA
ChangeServiceConfig2A
OpenSCManagerA
OpenServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ