Static task
static1
Behavioral task
behavioral1
Sample
a6c643d92762b427eb909bef8d9ecc63b62e00c870d207ec1e857ec58a654ee7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a6c643d92762b427eb909bef8d9ecc63b62e00c870d207ec1e857ec58a654ee7.exe
Resource
win10-20230703-en
General
-
Target
a6c643d92762b427eb909bef8d9ecc63b62e00c870d207ec1e857ec58a654ee7
-
Size
248KB
-
MD5
2905d8db74bde29f2edeb2fc2ee2ec96
-
SHA1
2b80a9049bf27fb32b2fc623ab1357153e87673c
-
SHA256
a6c643d92762b427eb909bef8d9ecc63b62e00c870d207ec1e857ec58a654ee7
-
SHA512
bdd25883304f3a8d3923670410b71121ba84d2837b3de9c2c3ee5ed4746d9e402075f3e9210f867ad87710a34f30a07c5b2472fb8176a0d3042fdedb432e3180
-
SSDEEP
3072:EL2rMykXCK/83ZwyU8uyYuQL704ZWCP7PmzBYMGDlDC92HokpJyP:aEK/832FyYuClPCBZ0lG2qP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6c643d92762b427eb909bef8d9ecc63b62e00c870d207ec1e857ec58a654ee7
Files
-
a6c643d92762b427eb909bef8d9ecc63b62e00c870d207ec1e857ec58a654ee7.exe windows x86
33d01e52b5d3f3ac460efee097541ee1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_llseek
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
EndUpdateResourceW
InterlockedIncrement
SetConsoleTextAttribute
GetConsoleAliasA
InterlockedDecrement
QueryPerformanceCounter
GetProfileStringW
OpenSemaphoreA
GetTickCount
GetNumberFormatA
WaitNamedPipeW
GetUserDefaultLangID
GetCommandLineA
GetConsoleCP
GlobalAlloc
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
_hread
GetCalendarInfoW
GetSystemWindowsDirectoryA
GetExitCodeProcess
GetTimeFormatW
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
CreateJobObjectA
GetPrivateProfileIntW
InterlockedExchange
GetStartupInfoA
GetConsoleAliasExesA
GetHandleInformation
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
MoveFileW
OpenWaitableTimerA
LoadLibraryA
SetCalendarInfoW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
AddAtomW
GlobalGetAtomNameW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
FreeEnvironmentStringsW
CreateMailslotA
EnumDateFormatsW
GetUserDefaultUILanguage
SetThreadAffinityMask
SetFileShortNameA
GetWindowsDirectoryW
FindFirstVolumeW
GetCurrentProcessId
DebugBreak
ResetWriteWatch
EnumSystemLocalesW
DeleteFileA
SetInformationJobObject
GetDateFormatW
OpenMutexW
GetVolumeNameForVolumeMountPointA
GetLastError
WideCharToMultiByte
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemTimeAsFileTime
SetFilePointer
Sleep
LCMapStringW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
SetStdHandle
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
RaiseException
gdi32
GetBoundsRect
GetCharWidthA
GetTextFaceA
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vajosi Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ