Static task
static1
Behavioral task
behavioral1
Sample
06399649a91edbb53a65c424a055d4e1001351fd5584c01b7e356b8b5f2e5e75.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
06399649a91edbb53a65c424a055d4e1001351fd5584c01b7e356b8b5f2e5e75.exe
Resource
win10v2004-20230703-en
General
-
Target
06399649a91edbb53a65c424a055d4e1001351fd5584c01b7e356b8b5f2e5e75.exe
-
Size
247KB
-
MD5
b37e4d2a9389070ac1e375e5c40e95e9
-
SHA1
c2c39918ec0933c63a7192003e3e96e24f07e093
-
SHA256
06399649a91edbb53a65c424a055d4e1001351fd5584c01b7e356b8b5f2e5e75
-
SHA512
ed0b756bf73e6fa3aab6cb079970f9da0981c580a4853a1d3622582358a59a95bd47f6facdcdb8fd681332f5a21ee35023df7ed19f2b603925fcbbe9820cec53
-
SSDEEP
6144:2z/+wYibmeRwUXLvipeSwNkLeY4vzP5zj:2rrYilRwUXLviISwN55
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06399649a91edbb53a65c424a055d4e1001351fd5584c01b7e356b8b5f2e5e75.exe
Files
-
06399649a91edbb53a65c424a055d4e1001351fd5584c01b7e356b8b5f2e5e75.exe.exe windows x86
bc8d7008ea0ec4cb514cbd2ecfa6dfa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
gdiplus
GdipCloneImage
GdipSaveImageToFile
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipGetImageEncodersSize
GdipAlloc
GdipFree
GdiplusStartup
shlwapi
PathFindFileNameW
PathFindExtensionW
psapi
EnumProcesses
GetProcessImageFileNameW
kernel32
GetLogicalDriveStringsW
HeapFree
GetProcessHeap
WriteFile
GlobalAlloc
Sleep
GetFileAttributesW
ReadFile
CreateFileW
ExitThread
FlushFileBuffers
GetLastError
GlobalFree
FindClose
FindNextFileW
CloseHandle
DeleteFileW
SetFileAttributesW
GetVolumeInformationW
GlobalMemoryStatus
FreeLibrary
QueryPerformanceCounter
GetTickCount
MoveFileExW
GetVersionExW
GetProcAddress
GetCurrentProcessId
GetEnvironmentVariableW
CreateProcessW
WaitForSingleObject
CopyFileW
GetModuleFileNameW
SetThreadPriority
CreateThread
GetCurrentProcess
SetLastError
LocalAlloc
GetShortPathNameW
LocalFree
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
HeapAlloc
GetDriveTypeW
SetFilePointer
FindFirstFileW
GetFileSize
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
HeapSize
SetEndOfFile
LoadLibraryW
GetStdHandle
ExitProcess
LCMapStringW
GetCurrentThreadId
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
user32
DrawTextA
ReleaseDC
LoadStringW
GetDC
gdi32
SetTextColor
SetBkMode
GetStockObject
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
GetSidSubAuthority
OpenProcessToken
RegSetValueExW
RegCloseKey
RegFlushKey
RegQueryValueExW
RegCreateKeyExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
ole32
CoInitializeEx
wininet
InternetCloseHandle
InternetCrackUrlA
InternetSetOptionA
InternetOpenA
HttpSendRequestA
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ