Static task
static1
Behavioral task
behavioral1
Sample
6a1349c2dd7b265b6b5d0fe488a39128ec71d2a08133ab5d566eb3560840b67a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6a1349c2dd7b265b6b5d0fe488a39128ec71d2a08133ab5d566eb3560840b67a.exe
Resource
win10v2004-20230831-en
General
-
Target
6a1349c2dd7b265b6b5d0fe488a39128ec71d2a08133ab5d566eb3560840b67a
-
Size
10.0MB
-
MD5
cb5ca13dd568228793999e6282b7fe1f
-
SHA1
d7aa61facbdead43f119cd8ff5ab8ffe150c54b5
-
SHA256
6a1349c2dd7b265b6b5d0fe488a39128ec71d2a08133ab5d566eb3560840b67a
-
SHA512
bad6ce8f0356175c9ceb96c837b4fd7e649423f334db2a3b3e22551020727ae3fd8cfd1ba36ca94fff2603609ee5332b531f13642d0b094068161c8b468c0396
-
SSDEEP
196608:ZVWdMlSkCdmYBzW2whVmBWEtKDz9/m6U7QUOZc7cxr1p0S2bc7yyfCPE:fcMSkCRBz2VmBlA/AMU00cpl2bc2yqPE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a1349c2dd7b265b6b5d0fe488a39128ec71d2a08133ab5d566eb3560840b67a
Files
-
6a1349c2dd7b265b6b5d0fe488a39128ec71d2a08133ab5d566eb3560840b67a.exe windows x86
77e82d910b00f5dda4227cfbcd1516ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
kernel32
GetCurrentProcess
GetCurrentProcessId
GetExitCodeProcess
GetCurrentThreadId
CreateProcessA
GetSystemInfo
GetSystemTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleExA
GetProcAddress
LoadLibraryA
LocalAlloc
LocalFree
FormatMessageA
lstrcmpA
lstrlenA
CopyFileA
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoA
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetFullPathNameA
SetDefaultDllDirectories
lstrcpynA
lstrcpyA
lstrcatA
CompareStringA
GlobalAlloc
GlobalFree
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
GlobalUnlock
GlobalLock
FileTimeToLocalFileTime
GetFileTime
LocalFileTimeToFileTime
SetEndOfFile
SetFilePointer
SetFileTime
GetVolumeInformationA
GetLocalTime
GetVersion
DosDateTimeToFileTime
SetVolumeLabelA
FileTimeToSystemTime
SystemTimeToFileTime
lstrcmpiA
CreateDirectoryW
GetFileAttributesExW
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetFullPathNameW
GetCurrentDirectoryW
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeZoneInformation
ReadConsoleW
ReadFile
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapReAlloc
SetStdHandle
WriteConsoleW
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
GetCommandLineW
GetCommandLineA
GetFileType
CreateEventA
CreateMutexA
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
QueryPerformanceCounter
GetLastError
RaiseException
CloseHandle
DecodePointer
OutputDebugStringA
GetTempPathA
SetFileAttributesW
SetFileAttributesA
RemoveDirectoryA
GetLongPathNameA
GetFileAttributesA
FlushFileBuffers
FindNextFileA
FindFirstFileA
FindClose
DeleteFileW
DeleteFileA
CreateFileW
CreateFileA
CreateDirectoryA
VerSetConditionMask
GetDriveTypeA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
EncodePointer
OutputDebugStringW
IsDebuggerPresent
user32
DispatchMessageA
PeekMessageA
DefWindowProcA
DestroyWindow
ShowWindow
TranslateMessage
SetWindowTextA
GetWindowRect
GetWindowLongA
SetWindowLongA
ExitWindowsEx
CharPrevA
LoadStringA
CreateDialogParamA
LoadIconA
OemToCharA
CharNextA
wsprintfA
MsgWaitForMultipleObjects
SystemParametersInfoA
IsDialogMessageA
SetForegroundWindow
GetSystemMetrics
SetFocus
SetDlgItemTextA
GetDlgItem
MoveWindow
WaitMessage
PostMessageA
SendMessageA
MessageBoxA
advapi32
LookupPrivilegeValueA
SetKernelObjectSecurity
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetKernelObjectSecurity
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
FreeSid
AllocateAndInitializeSid
OpenProcessToken
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ole32
CoTaskMemFree
CoCreateGuid
StringFromGUID2
Sections
.text Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ