Static task
static1
Behavioral task
behavioral1
Sample
d6c2a3ca23e68716750ea9e84db4e6a1988f838de569371e75687e653217f106.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d6c2a3ca23e68716750ea9e84db4e6a1988f838de569371e75687e653217f106.exe
Resource
win10v2004-20230703-en
General
-
Target
d6c2a3ca23e68716750ea9e84db4e6a1988f838de569371e75687e653217f106
-
Size
422KB
-
MD5
3b70d09c6cdd8a0f224afa9e14fdd083
-
SHA1
f8a5726b1b69fc6fe301036d691f852ed7bfaede
-
SHA256
d6c2a3ca23e68716750ea9e84db4e6a1988f838de569371e75687e653217f106
-
SHA512
c891c7cd7eef1ff72ae8a93a76677e46eb3cbf3160a14c29f36b4226df6edd2605d3a1f8525698faf5b0d88ec4333875c32ef7e26a8f5e639605275c4791e5d3
-
SSDEEP
6144:f0wk4Fdz57AWVQrTgb1ISGxcXihm5aVXijcuWmpZisXbz:bz5jVQngb1ISGxwiw+uWmfNbz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6c2a3ca23e68716750ea9e84db4e6a1988f838de569371e75687e653217f106
Files
-
d6c2a3ca23e68716750ea9e84db4e6a1988f838de569371e75687e653217f106.exe windows x86
e3bfab659ac28156f6d2cbbf6da12f06
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
SetLastError
FreeLibrary
GetModuleFileNameW
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
LoadLibraryW
lstrcmpiW
MultiByteToWideChar
CreateFileW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapDestroy
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetEnvironmentVariableW
WideCharToMultiByte
DecodePointer
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetLastError
SetConsoleCtrlHandler
GetCurrentThread
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
WriteConsoleW
TlsAlloc
InterlockedFlushSList
GetLocaleInfoW
RaiseException
InitOnceBeginInitialize
InitOnceComplete
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
CloseHandle
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
user32
PeekMessageW
SendMessageW
UnregisterClassW
SetWindowPos
GetSystemMetrics
GetClientRect
IsDialogMessageW
SetWindowLongW
SetWindowTextW
EnableWindow
GetActiveWindow
CharNextW
GetDlgItem
EndDialog
DialogBoxParamW
CreateDialogParamW
GetWindowRect
DestroyWindow
PostQuitMessage
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
GetWindowLongW
MapWindowPoints
advapi32
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
oleaut32
VarUI4FromStr
SysFreeString
shlwapi
PathIsPrefixW
comctl32
InitCommonControlsEx
Sections
.text Size: 341KB - Virtual size: 341KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ