Static task
static1
Behavioral task
behavioral1
Sample
6be073cfd139fd212d2322b96d5f5861aaa1adb667c67933c27e0bc7dd5d50b8.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
6be073cfd139fd212d2322b96d5f5861aaa1adb667c67933c27e0bc7dd5d50b8.exe
Resource
win10v2004-20230703-en
General
-
Target
6be073cfd139fd212d2322b96d5f5861aaa1adb667c67933c27e0bc7dd5d50b8
-
Size
927KB
-
MD5
d64fe8359e77adc106e3d935c3cb5cb9
-
SHA1
722f06e2fd486a76e2a2182908590499404e5021
-
SHA256
6be073cfd139fd212d2322b96d5f5861aaa1adb667c67933c27e0bc7dd5d50b8
-
SHA512
4b2ecba42845b17adc4cb485792117bd3fc5472dbdf67a80300c9ab835663a11627b4819c1ba947c683c5b1e42e01c7b88a35e6c38ff7de51c9757a541a60102
-
SSDEEP
24576:04q114kE0g0PjpYsNoSEkNBsbgAxTGtGef/4Z24k416oEWMyz+xyt:0n8ggEjmZSEipXoMyzYyt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6be073cfd139fd212d2322b96d5f5861aaa1adb667c67933c27e0bc7dd5d50b8
Files
-
6be073cfd139fd212d2322b96d5f5861aaa1adb667c67933c27e0bc7dd5d50b8.exe windows x86
5ee262bbc9bac4411815c27eca17f89e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
d3d9
Direct3DCreate9
dsound
DirectSoundCreate8
gdi32
GetStockObject
SetDIBitsToDevice
kernel32
CloseHandle
CompareStringA
CompareStringW
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexW
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
EnumCalendarInfoA
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FindResourceExA
FormatMessageA
FreeLibrary
FreeResource
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
SetEndOfFile
SetEvent
SetFilePointer
SetLastError
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
oleaut32
SafeArrayAccessData
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SafeArrayUnaccessData
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VariantChangeTypeEx
VariantClear
VariantCopy
VariantInit
shell32
SHGetSpecialFolderPathA
ShellExecuteA
user32
AdjustWindowRect
BeginPaint
CharLowerA
CharLowerBuffA
CharLowerBuffW
CharUpperA
CharUpperBuffA
CharUpperBuffW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
EndPaint
EnumDisplaySettingsA
FindWindowW
GetAsyncKeyState
GetCursorPos
GetSystemMetrics
InvalidateRect
LoadCursorA
LoadIconW
MessageBeep
MessageBoxA
PeekMessageW
RegisterClassW
ScreenToClient
SetFocus
SetForegroundWindow
SetWindowLongA
SetWindowPos
SetWindowTextW
ShowWindowAsync
TranslateMessage
UnregisterClassW
WaitMessage
Sections
.text Size: 660KB - Virtual size: 660KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 324KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE