Static task
static1
Behavioral task
behavioral1
Sample
6008133e2630da169840e62618c94eca14534791d4e95272f45e30c8731c1ee3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6008133e2630da169840e62618c94eca14534791d4e95272f45e30c8731c1ee3.exe
Resource
win10v2004-20230824-en
General
-
Target
6008133e2630da169840e62618c94eca14534791d4e95272f45e30c8731c1ee3
-
Size
20KB
-
MD5
936590a6ba88e80758f85ead2dd29405
-
SHA1
a9070ade4176a7e25bdeaf7039aa5427235d6c8f
-
SHA256
6008133e2630da169840e62618c94eca14534791d4e95272f45e30c8731c1ee3
-
SHA512
740cc7630df1df0aa9a2847dea0ec4b32ca0d901868fb706ffc99bab0f18f7df64fd54dd6d4138317acdbc2a518f23bff54c75b7efdb5b4cd730ead7971e3216
-
SSDEEP
384:oizPcKGbjcRbL7ElITOnoebxh6JztUU1KASvU507:pIfoRLEUyo0hCt7I854
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6008133e2630da169840e62618c94eca14534791d4e95272f45e30c8731c1ee3
Files
-
6008133e2630da169840e62618c94eca14534791d4e95272f45e30c8731c1ee3.exe windows x64
25c0d3704bf50a6212f40eb45fe1fb10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
strlen
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
RtlCompareUnicodeString
RtlEqualUnicodeString
RtlFreeUnicodeString
DbgPrint
RtlGetVersion
KeInitializeEvent
ExAllocatePool
ExFreePoolWithTag
ExAcquireFastMutex
ExReleaseFastMutex
ProbeForRead
ProbeForWrite
MmBuildMdlForNonPagedPool
MmMapLockedPages
MmUnmapLockedPages
MmCreateMdl
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoFreeMdl
ObfDereferenceObject
ZwClose
MmIsAddressValid
PsSetCreateProcessNotifyRoutineEx
ZwTerminateProcess
ZwOpenProcess
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
ZwQueryVirtualMemory
PsGetProcessWow64Process
PsGetProcessPeb
__C_specific_handler
strncmp
KeWaitForSingleObject
ExAllocatePoolWithTag
PsWrapApcWow64Thread
PsGetCurrentThreadId
PsGetProcessId
PsIsThreadTerminating
PsLookupThreadByThreadId
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
KeInitializeApc
KeInsertQueueApc
KeTestAlertThread
PsGetThreadTeb
PsGetCurrentProcessWow64Process
ZwQuerySystemInformation
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ