Static task
static1
Behavioral task
behavioral1
Sample
9e6ce673dc161fc54b110782f18ec9bb3690b9ccdde494196ccb5bb0381dfa94.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9e6ce673dc161fc54b110782f18ec9bb3690b9ccdde494196ccb5bb0381dfa94.exe
Resource
win10v2004-20230703-en
General
-
Target
9e6ce673dc161fc54b110782f18ec9bb3690b9ccdde494196ccb5bb0381dfa94
-
Size
260KB
-
MD5
e48aed8d0d36c84893d0138380cfa502
-
SHA1
304161c0718d7f89489a722aab079bea2d244c3c
-
SHA256
9e6ce673dc161fc54b110782f18ec9bb3690b9ccdde494196ccb5bb0381dfa94
-
SHA512
91bfa453246e609eab89b877ba3a7a25270979889ed62f76176e68d15dea831806c2b819125de60217c3f00d9168078fb9f3e7543ebc46a91c851adf9ec13be1
-
SSDEEP
3072:wM1uSnn2s90r+1fRCpYM11PuVn6NCy2L0rshPXW/02QMG/uLLRKx:RuBs90r+1fIZ1PuVn4Cy2HPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e6ce673dc161fc54b110782f18ec9bb3690b9ccdde494196ccb5bb0381dfa94
Files
-
9e6ce673dc161fc54b110782f18ec9bb3690b9ccdde494196ccb5bb0381dfa94.exe windows x86
6697fa255a05fffbb8331cc121287cb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
GetPrivateProfileSectionNamesW
SearchPathW
GetConsoleAliasesLengthW
InterlockedIncrement
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
FreeEnvironmentStringsA
GetTickCount
GetCurrentThread
ConvertFiberToThread
GetNumberFormatA
EnumTimeFormatsW
GetCommandLineA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
CreateSemaphoreA
GetFileAttributesW
WriteConsoleW
GetCompressedFileSizeA
CompareStringW
GetVolumePathNameA
EnumSystemLocalesA
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
MoveFileW
GlobalGetAtomNameA
SearchPathA
SetFileAttributesA
GlobalFree
OpenWaitableTimerA
LoadLibraryA
OpenThread
InterlockedExchangeAdd
MoveFileA
VirtualLock
AddAtomA
HeapWalk
OpenJobObjectW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
CreateMailslotA
WaitForDebugEvent
GetShortPathNameW
GetCPInfoExA
SetCalendarInfoA
SetFileShortNameA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
ReadConsoleOutputCharacterW
OpenFileMappingA
LocalFileTimeToFileTime
ReadFile
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
HeapReAlloc
user32
GetAltTabInfoA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 23.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hak Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ