Static task
static1
Behavioral task
behavioral1
Sample
6b70014a8475dabccea137f2b73fa0837db6bc3157be01b2074d37e94025dc35.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6b70014a8475dabccea137f2b73fa0837db6bc3157be01b2074d37e94025dc35.exe
Resource
win10v2004-20230703-en
General
-
Target
6b70014a8475dabccea137f2b73fa0837db6bc3157be01b2074d37e94025dc35
-
Size
1.6MB
-
MD5
ce365acefe742e04e660b96ae66ba455
-
SHA1
ecd99bd3ebbc634be637dda684d9d9411e81324c
-
SHA256
6b70014a8475dabccea137f2b73fa0837db6bc3157be01b2074d37e94025dc35
-
SHA512
f54d54556e42f2f224fd07e64fc1137de0448b1a6bb5e6546cb8e9e795df3da5d042d9fd64c72bcf52d76c563870069465267b15f77315e74a3758050be5b475
-
SSDEEP
49152:1dOC5T1KLkCjMvY24CVkLdO2bhXAmwoTP:as1KLkC4vY24sId5lXAmDP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b70014a8475dabccea137f2b73fa0837db6bc3157be01b2074d37e94025dc35
Files
-
6b70014a8475dabccea137f2b73fa0837db6bc3157be01b2074d37e94025dc35.exe windows x86
107ff63f658d6feb25c073be45ea521d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
user32
LoadIconA
gdi32
GetTextMetricsA
winmm
waveOutUnprepareHeader
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
ws2_32
inet_ntoa
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 628KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 968KB - Virtual size: 968KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ