Static task
static1
Behavioral task
behavioral1
Sample
6e892defe3ed6da92f0389fc2bf4399b7165475671c863a38065d88bd16f85ea.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6e892defe3ed6da92f0389fc2bf4399b7165475671c863a38065d88bd16f85ea.exe
Resource
win10v2004-20230703-en
General
-
Target
6e892defe3ed6da92f0389fc2bf4399b7165475671c863a38065d88bd16f85ea
-
Size
8.9MB
-
MD5
36ee8e7c8020295754f12a7351dd0a30
-
SHA1
618d3fbaf1ee8d4cc572eef648e9e8ba18c9f3c3
-
SHA256
6e892defe3ed6da92f0389fc2bf4399b7165475671c863a38065d88bd16f85ea
-
SHA512
31f821af16ff79bf2347ac7197f504eca59634986660d685393e23f400a0a90735f6687b045d4c5d2eee97ba8ec9bc04b987ef7c321bdd28debd933c7bba9b22
-
SSDEEP
196608:rghG6j9HHQk0AsDfGSzzcCTK9JXSApo4OJ94Hjw7OeBIHHV25xq:chG+9nQy8XYC+9JK4OWjIOKIH125
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e892defe3ed6da92f0389fc2bf4399b7165475671c863a38065d88bd16f85ea
Files
-
6e892defe3ed6da92f0389fc2bf4399b7165475671c863a38065d88bd16f85ea.exe windows x86
17bf675c29b8c3d41e1510214131ac26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
HideCaret
advapi32
RegOpenKeyExA
ole32
OleCreateMenuDescriptor
oleaut32
VariantClear
msimg32
TransparentBlt
comctl32
ImageList_GetIconSize
shlwapi
PathFindExtensionA
winmm
PlaySoundA
gdiplus
GdipGetImageWidth
oleacc
CreateStdAccessibleObject
imm32
ImmReleaseContext
gdi32
CreateRectRgnIndirect
winspool.drv
OpenPrinterA
comdlg32
GetFileTitleA
shell32
SHGetFileInfoA
Sections
.text Size: 8.8MB - Virtual size: 10.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE