Static task
static1
Behavioral task
behavioral1
Sample
b6ee3419715d088df1c5aae8db0633101945289afaab334f020d80011f15ecc9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b6ee3419715d088df1c5aae8db0633101945289afaab334f020d80011f15ecc9.exe
Resource
win10v2004-20230703-en
General
-
Target
b6ee3419715d088df1c5aae8db0633101945289afaab334f020d80011f15ecc9
-
Size
427KB
-
MD5
cd0ade05e87981692b40a1fce4f2adcd
-
SHA1
7814ae67c59d8101b76187f963873726c2cad4e6
-
SHA256
b6ee3419715d088df1c5aae8db0633101945289afaab334f020d80011f15ecc9
-
SHA512
85e17984d08cbec7a368e8e2438860be1e70f8bf44a8f799ed6675e449babad2c7e4a7f80d278c6f2dd54c998b9f083fe40b7ae8604a31c6f95e7bca4d44ce05
-
SSDEEP
12288:JqOQfTIJzIroN/lJ09kVk7caS6ALD+X+oDf0K2TsvAV5:0c29tcaWt6f0b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6ee3419715d088df1c5aae8db0633101945289afaab334f020d80011f15ecc9
Files
-
b6ee3419715d088df1c5aae8db0633101945289afaab334f020d80011f15ecc9.exe windows x86
460d36e1008c38762a8601f3ae40b775
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
GetSystemTimeAsFileTime
GetModuleHandleW
GetModuleHandleExA
GetProcAddress
CreateFileW
DeleteFileW
SetFilePointer
WriteFile
OutputDebugStringA
SetLastError
ReleaseMutex
CreateMutexW
GetLocalTime
GetModuleFileNameW
ConnectNamedPipe
CreateNamedPipeW
GetNamedPipeInfo
CancelIo
GetCommandLineW
GetSystemDirectoryW
GetWindowsDirectoryW
GetCurrentDirectoryW
FindClose
FindNextFileW
GetTempPathW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetVersionExW
GetNativeSystemInfo
IsDebuggerPresent
RaiseException
GetCurrentThreadId
FlushFileBuffers
SetFilePointerEx
GetModuleHandleExW
WriteConsoleW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
DuplicateHandle
ReadFile
GetStdHandle
SetUnhandledExceptionFilter
WaitForSingleObject
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
CloseHandle
SetEvent
CreateEventW
LocalAlloc
GetTickCount
GetLastError
Sleep
HeapReAlloc
GetFileType
HeapFree
HeapAlloc
GetConsoleMode
GetConsoleCP
ExitProcess
LoadLibraryExW
FreeLibrary
RtlUnwind
GetStartupInfoW
InitializeSListHead
WideCharToMultiByte
SwitchToThread
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
HeapSize
user32
CallMsgFilterW
MessageBoxW
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
WaitMessage
DefWindowProcW
PostQuitMessage
SetTimer
MsgWaitForMultipleObjectsEx
GetQueueStatus
KillTimer
DestroyWindow
CreateWindowExW
RegisterClassExW
UnregisterClassW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenServiceW
shell32
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
winmm
timeEndPeriod
timeGetTime
timeBeginPeriod
Sections
.text Size: 277KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ