Static task
static1
Behavioral task
behavioral1
Sample
6bb525e2166fae17ef896ee1dfe2154a0743e3a6cbe69bfe69ca690a9b54c90e.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
6bb525e2166fae17ef896ee1dfe2154a0743e3a6cbe69bfe69ca690a9b54c90e.exe
Resource
win10v2004-20230703-en
General
-
Target
6bb525e2166fae17ef896ee1dfe2154a0743e3a6cbe69bfe69ca690a9b54c90e
-
Size
1020KB
-
MD5
eefaa64ce15f0f53c5e19439d71eea17
-
SHA1
a6590c7b8dbbb96404b2aaff77b15c7b548036fd
-
SHA256
6bb525e2166fae17ef896ee1dfe2154a0743e3a6cbe69bfe69ca690a9b54c90e
-
SHA512
5f16a8480cd00a329216c22c0d4cdd317f4fa7e04cefe164f255c5331476f9e742d17bf325681d3a917ff02e8365c8f1d358ac69fdc14cba1b1737ee2d8d489c
-
SSDEEP
24576:Px8aST3sTssuL+WXltFZ2iVftQtJer6j0Eq/:PuIKtQtO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6bb525e2166fae17ef896ee1dfe2154a0743e3a6cbe69bfe69ca690a9b54c90e
Files
-
6bb525e2166fae17ef896ee1dfe2154a0743e3a6cbe69bfe69ca690a9b54c90e.exe windows x86
61ec5904c3a9ec4e28df113b51fa69c4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
smwdmif
IsDriverLoaded
SetSpeakerConfiguration
SMaxLog
GetPlatformIDString
SetUserState
GetPlatformHWInformation
GetIndependentFrontMic
SetIndependentFrontMic
SetRearSpeakerMute
SetIndependentHeadphone
GetIndependentHeadphone
GetSPDIFCAPRATE
TerminateAllInst
ClearToTerminate
GetRearSpeakerMute
GetJackDevice
SetJackDevice
GetInterfaceVersion
GetOpMode
InitInterface
GetCapabilities
GetJackFunction
winmm
mixerGetID
waveInGetNumDevs
waveInGetDevCapsA
mixerGetNumDevs
mixerSetControlDetails
mixerGetControlDetailsA
mixerGetLineControlsA
mixerGetDevCapsA
PlaySoundA
mixerGetLineInfoA
mfc42
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3721
ord795
ord609
ord860
ord567
ord825
ord800
ord2370
ord2302
ord6334
ord6199
ord922
ord858
ord3742
ord818
ord1146
ord2152
ord1233
ord1168
ord540
ord4275
ord2915
ord5718
ord2379
ord3571
ord640
ord5785
ord1640
ord323
ord3626
ord2414
ord1641
ord3663
ord2405
ord5873
ord6021
ord6880
ord613
ord823
ord289
ord2078
ord6197
ord3797
ord2648
ord537
ord6172
ord5875
ord5789
ord3873
ord3619
ord5981
ord2864
ord4220
ord2584
ord3654
ord2438
ord1644
ord941
ord3706
ord2860
ord535
ord4160
ord2393
ord861
ord2818
ord924
ord6283
ord4129
ord4278
ord3521
ord715
ord415
ord5620
ord1081
ord4277
ord3522
ord6403
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord2621
ord6117
ord6402
ord2827
ord6401
ord668
ord2770
ord356
ord5683
ord6663
ord6930
ord1576
ord641
ord5823
ord3664
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord3573
ord616
ord324
ord4234
ord2116
ord4299
ord4710
ord755
ord470
ord6453
ord2859
ord4538
ord3920
ord2642
ord6215
ord2645
ord6908
ord6270
ord2863
ord4224
ord353
ord6157
ord5791
ord1175
ord2380
ord5710
ord6662
ord6380
ord2301
ord1088
ord2122
ord556
ord3092
ord3138
ord2614
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord3574
ord4396
ord2575
ord3597
ord4425
ord5280
ord1775
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord2450
ord6928
msvcrt
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
??1type_info@@UAE@XZ
sscanf
_findfirst
_findclose
strtok
_mbsicmp
_mbslen
sprintf
strncpy
wcsncpy
_ftol
__CxxFrameHandler
_setmbcp
kernel32
lstrcpynA
GetStartupInfoA
FreeLibrary
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LockResource
LoadResource
FindResourceExA
GetVersionExA
GetSystemDefaultLangID
GetModuleFileNameA
lstrlenA
lstrcatA
lstrcpyA
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetWindowsDirectoryA
GetCurrentProcess
CloseHandle
WriteFile
CreateFileA
lstrcmpiA
GlobalFree
GlobalUnlock
GlobalAlloc
GlobalLock
DeviceIoControl
Sleep
GetLastError
user32
LoadMenuA
GetFocus
RegisterWindowMessageA
PostMessageA
FindWindowA
MessageBoxA
FillRect
GetParent
BringWindowToTop
SetForegroundWindow
SetFocus
SetWindowPos
ReleaseDC
GetComboBoxInfo
GetDC
CopyRect
GetClassNameA
SetWindowRgn
SetMenuDefaultItem
DeleteMenu
GetSubMenu
OffsetRect
GetCursorPos
DrawEdge
ExitWindowsEx
SetCursor
LoadCursorA
PtInRect
GetMessagePos
GetClientRect
GetSysColor
GetWindowTextA
GetActiveWindow
SetClassLongA
GetSystemMetrics
GetWindowPlacement
SystemParametersInfoA
SetWindowPlacement
ClientToScreen
ScreenToClient
InvalidateRect
DrawFocusRect
DrawTextA
SendMessageA
GetWindowRect
LoadBitmapA
IsWindow
KillTimer
SetTimer
LoadIconA
SetRect
EnableWindow
GetWindowLongA
SetWindowLongA
LoadMenuIndirectA
gdi32
CreatePolygonRgn
DeleteDC
GetBkColor
SetBkColor
DPtoLP
StretchDIBits
GetPixel
SelectObject
CreateSolidBrush
CombineRgn
GetCurrentObject
GetBitmapBits
CreateRectRgn
OffsetRgn
CreateFontIndirectA
GetTextExtentPoint32A
CreateBitmap
CreateCompatibleBitmap
GetMapMode
StretchBlt
DeleteObject
CreateBitmapIndirect
BitBlt
GetObjectA
CreateCompatibleDC
advapi32
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
Shell_NotifyIconA
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 844KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE