Static task
static1
Behavioral task
behavioral1
Sample
6cd2b1c1d7a46bea3bb73c820a1f8b41c5c713ed5e38197186956487e29ff50f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6cd2b1c1d7a46bea3bb73c820a1f8b41c5c713ed5e38197186956487e29ff50f.exe
Resource
win10v2004-20230703-en
General
-
Target
6cd2b1c1d7a46bea3bb73c820a1f8b41c5c713ed5e38197186956487e29ff50f
-
Size
59KB
-
MD5
a4fa1699d7dc3d7af91caea0cd4fa928
-
SHA1
0efb8470291e3c8480a6f295440255befc40077a
-
SHA256
6cd2b1c1d7a46bea3bb73c820a1f8b41c5c713ed5e38197186956487e29ff50f
-
SHA512
08d4a9a5cb1e3c783d19e0b4955aed6ebca19b6234450943b2ef7f33cead941780be4c8eb82db94acce70f3a8c378fad527b480b8f376f5887ae916269066dbf
-
SSDEEP
384:GRo5W9G6NBf+LY408QtKm4vV533LR5YXVzkASKw0f2fIQXt2SwsOnLMnqC+7GWF:K4C4PeC/IQCnYqR7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cd2b1c1d7a46bea3bb73c820a1f8b41c5c713ed5e38197186956487e29ff50f
Files
-
6cd2b1c1d7a46bea3bb73c820a1f8b41c5c713ed5e38197186956487e29ff50f.exe windows x86
db277f0791c951abbedd687d9de0fc32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalLock
WriteFile
ReadFile
CloseHandle
SetFilePointer
CreateFileA
GetFileType
GetStartupInfoA
GetStdHandle
GetCommandLineA
SetUnhandledExceptionFilter
user32
MessageBoxA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 627B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.stabstr Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ