Static task
static1
Behavioral task
behavioral1
Sample
6551e9616b37445157fe31376073ac2b63145d600087847c29582b3289a03753.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6551e9616b37445157fe31376073ac2b63145d600087847c29582b3289a03753.exe
Resource
win10-20230703-en
General
-
Target
6551e9616b37445157fe31376073ac2b63145d600087847c29582b3289a03753
-
Size
257KB
-
MD5
06205daf41431e8258345c39d63f2054
-
SHA1
0883aa3481d0394cad8bef15eec3129cf8e3be90
-
SHA256
6551e9616b37445157fe31376073ac2b63145d600087847c29582b3289a03753
-
SHA512
e793d570566f18e6fb664f86854a5f31e63f2772a04e24dfb2bcbaf92310996ef7dfd934bdf22e50c6f766c8beb95c94fcc52aab4255eb51aaf8bf1aeed03e62
-
SSDEEP
3072:HRFbvXq2ORIjgjmNjUWMK88bswGlRWpJkFtWnTGyOuArcSo:xFDa2YIcjoV/+lRWpJkFtK8x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6551e9616b37445157fe31376073ac2b63145d600087847c29582b3289a03753
Files
-
6551e9616b37445157fe31376073ac2b63145d600087847c29582b3289a03753.exe windows x86
79e975a9410c93189a76e54d98ddfc3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeNameForVolumeMountPointA
GetCommandLineW
GetComputerNameA
GetFileSize
SetDefaultCommConfigA
GetDriveTypeW
GetConsoleAliasExesLengthA
UpdateResourceA
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
SetConsoleActiveScreenBuffer
GetProfileStringW
GetUserDefaultLCID
SetComputerNameW
GetTimeFormatA
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
CreateNamedPipeW
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsA
GlobalAlloc
GetPrivateProfileIntA
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetPrivateProfileStructW
GetCalendarInfoW
SetConsoleCP
DeleteVolumeMountPointW
GetFileAttributesA
TransactNamedPipe
GetCompressedFileSizeA
GetStartupInfoW
CreateMailslotW
VirtualUnlock
GetNamedPipeHandleStateW
SetCurrentDirectoryA
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
VirtualAlloc
BackupWrite
MoveFileW
GlobalGetAtomNameA
GlobalFree
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GetNumberFormatW
GetCurrentConsoleFont
EnumDateFormatsA
CreateIoCompletionPort
_lread
OpenFileMappingW
FreeEnvironmentStringsW
FindNextFileW
GetCurrentDirectoryA
FatalAppExitA
OpenSemaphoreW
FindFirstVolumeA
TerminateJobObject
LocalSize
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
DeleteFileA
CloseHandle
ReadFile
WriteConsoleW
LCMapStringW
HeapReAlloc
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MoveFileA
HeapFree
HeapAlloc
ExitProcess
GetCommandLineA
HeapSetInformation
RtlUnwind
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
WriteFile
GetModuleFileNameW
SetFilePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CreateFileW
user32
CharUpperA
CharUpperBuffA
winhttp
WinHttpGetProxyForUrl
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ