Static task
static1
Behavioral task
behavioral1
Sample
6973e189ddf96de17c497290cf8dadcf9b82524e81ea0fd4c2fd402ac4c56e5e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6973e189ddf96de17c497290cf8dadcf9b82524e81ea0fd4c2fd402ac4c56e5e.exe
Resource
win10v2004-20230703-en
General
-
Target
6973e189ddf96de17c497290cf8dadcf9b82524e81ea0fd4c2fd402ac4c56e5e
-
Size
3.8MB
-
MD5
abde6b66ae4482734a04fb0f9087e22e
-
SHA1
9c8ac8a5b671875f8112159f73b5bc95c56bc592
-
SHA256
6973e189ddf96de17c497290cf8dadcf9b82524e81ea0fd4c2fd402ac4c56e5e
-
SHA512
df08ccc8187293c857ab8740848d33e6ad69241583a37f5fea452b16ad5290745eb0c13cfd01e57ac0d46f9ecef4e872d48c81743e83e0f311d08f0dae139c55
-
SSDEEP
49152:JLY9EhvITYkLMGySEYlHYZ2m8XTvAXTPdYmrV4IYkDXHEPlIfvuTU+bm41:pYahvITY2fbrTMrvOUDHE0WTu41
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6973e189ddf96de17c497290cf8dadcf9b82524e81ea0fd4c2fd402ac4c56e5e
Files
-
6973e189ddf96de17c497290cf8dadcf9b82524e81ea0fd4c2fd402ac4c56e5e.exe windows x86
c7a59fd05f02f21ff21aee5552fd5dd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
user32
GetMenuItemCount
gdi32
SelectPalette
winmm
midiStreamRestart
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayGetUBound
comctl32
ord17
ws2_32
recvfrom
comdlg32
GetFileTitleA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.8MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 1000KB - Virtual size: 1000KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ