Static task
static1
Behavioral task
behavioral1
Sample
6ddfa55f2395436447b0e3bad7736a71e249130c1d948bf00b7a19e7c1944a13.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6ddfa55f2395436447b0e3bad7736a71e249130c1d948bf00b7a19e7c1944a13.exe
Resource
win10v2004-20230831-en
General
-
Target
6ddfa55f2395436447b0e3bad7736a71e249130c1d948bf00b7a19e7c1944a13
-
Size
96KB
-
MD5
902c0efb1d66d23ad19a88ca3a7281c2
-
SHA1
3d2c853bf300562da65588ad31610451f05cbc75
-
SHA256
6ddfa55f2395436447b0e3bad7736a71e249130c1d948bf00b7a19e7c1944a13
-
SHA512
88b838c9adaa7ee3822cf8c8c9aa0401aa890fce766c3c3f883ed3dce5b6dd4ad074379de437b9e3d2fd63ae846e27e186ac3586389b73f18cc2ea7688d54312
-
SSDEEP
1536:zzbiQoi6LK+F9/iHT/64wD7q43BF7Uo/5kb:OQot1d+C4zE7Uo/5kb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ddfa55f2395436447b0e3bad7736a71e249130c1d948bf00b7a19e7c1944a13
Files
-
6ddfa55f2395436447b0e3bad7736a71e249130c1d948bf00b7a19e7c1944a13.exe windows x86
abbf8243117e4357b7d8b36264414d73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetExitCodeThread
GetLastError
CreateDirectoryA
GetTickCount
GetTempPathA
GetVersionExA
CreateMutexA
ProcessIdToSessionId
GetCurrentProcessId
GetPrivateProfileIntA
SetLastError
MultiByteToWideChar
WideCharToMultiByte
FindResourceA
SizeofResource
LockResource
LoadResource
FindResourceExA
EnterCriticalSection
SetEvent
RaiseException
FlushInstructionCache
GetCurrentProcess
GetPrivateProfileStringA
GetSystemDefaultLangID
LeaveCriticalSection
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
ResetEvent
CloseHandle
CreateEventA
WaitForSingleObject
GetCurrentThreadId
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedCompareExchange
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
RtlUnwind
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
IsDebuggerPresent
DebugBreak
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeLibrary
GetModuleFileNameW
VirtualQuery
user32
EndDialog
wsprintfA
GetActiveWindow
ShowWindow
GetDlgItem
SetDlgItemTextA
PostMessageA
SendMessageA
UnregisterClassA
SetWindowLongA
DialogBoxParamA
MessageBoxA
SetWindowTextA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
ord680
ole32
CoUninitialize
CoInitialize
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntry
wintrust
WinVerifyTrust
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ