Static task
static1
Behavioral task
behavioral1
Sample
6cec55a1b1e86a7713a02062f71bb8abc817ec2859fb9179bd318c2eec5f6280.exe
Resource
win10-20230703-en
General
-
Target
6cec55a1b1e86a7713a02062f71bb8abc817ec2859fb9179bd318c2eec5f6280
-
Size
309KB
-
MD5
be375b43d9c71deea9b2d463176554cb
-
SHA1
2b9ccf946190dfb9b5ed6b1a8ea0f56e8b27d1d3
-
SHA256
6cec55a1b1e86a7713a02062f71bb8abc817ec2859fb9179bd318c2eec5f6280
-
SHA512
56c6ae7d5de803a8b7187e9bbc54dd946b50b6686caed9d807fc3495c40e28d3ef7eda6a791774e7fb23b9cd695d1e16beed2f47cb288ae13ed0412b2c5747b6
-
SSDEEP
6144:MZfxNJ5zH59c3ytCLOoiE3ZV1jGrzNx8tLEEPAci:WxrfcytGOjERarQwEoX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cec55a1b1e86a7713a02062f71bb8abc817ec2859fb9179bd318c2eec5f6280
Files
-
6cec55a1b1e86a7713a02062f71bb8abc817ec2859fb9179bd318c2eec5f6280.exe windows x86
04e6f3b72e548c719c7cd8b3a1be4f09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetHandleInformation
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetTickCount
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
WaitNamedPipeW
EnumTimeFormatsA
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
GetExitCodeProcess
GetConsoleAliasW
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
GetStartupInfoW
CreateJobObjectA
EnumSystemLocalesA
GetConsoleAliasExesLengthA
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
SetLastError
GetProcAddress
MoveFileW
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
GetFileType
MoveFileA
GetNumberFormatW
GlobalGetAtomNameW
GetPrivateProfileSectionNamesA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
EnumDateFormatsW
PeekConsoleInputA
SetCalendarInfoA
OpenSemaphoreW
SetFileShortNameA
ReadConsoleInputW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DebugBreak
ResetWriteWatch
ReadConsoleOutputCharacterW
DeleteFileA
GetSystemDefaultLangID
MoveFileExA
GetConsoleAliasExesA
SetFilePointer
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
HeapReAlloc
GetConsoleCP
SetStdHandle
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
GetCharWidthW
GetTextFaceA
SelectPalette
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.suxesic Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ