Static task
static1
Behavioral task
behavioral1
Sample
6a83abe42e1c91f3f01034a7368da437e0134a92e1ff476ebefc0f937f4b1fd1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6a83abe42e1c91f3f01034a7368da437e0134a92e1ff476ebefc0f937f4b1fd1.exe
Resource
win10v2004-20230915-en
General
-
Target
6a83abe42e1c91f3f01034a7368da437e0134a92e1ff476ebefc0f937f4b1fd1
-
Size
2.3MB
-
MD5
7f0e929ac93b79298669fb53109268cd
-
SHA1
967c894ae24a655a4586ab84e5b84d1fea15f447
-
SHA256
6a83abe42e1c91f3f01034a7368da437e0134a92e1ff476ebefc0f937f4b1fd1
-
SHA512
2932843db46dcd4cf0cae7c5306ad0d1851999a0ec8c9cc14cefacdb11792abd5dae3f03c4c85a9d9d69348298fa8cc31a0a46a530eaedc218562cbc83a46e53
-
SSDEEP
49152:SEE0rxAC8nOT8y9E8SB69/YalVXz/qu23nueq4l84hbqLSg2WwuJWwM:Tuy9rgaPXz/X23nut4l84heLU2JW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a83abe42e1c91f3f01034a7368da437e0134a92e1ff476ebefc0f937f4b1fd1
Files
-
6a83abe42e1c91f3f01034a7368da437e0134a92e1ff476ebefc0f937f4b1fd1.exe windows:6 windows x64
c5a17a2862fce7414d7bd345a25fd6e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
wsock32
htons
inet_ntoa
ioctlsocket
ntohs
recv
setsockopt
socket
WSAStartup
gethostbyname
WSAGetLastError
send
bind
connect
closesocket
WSACleanup
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetProcessId
GetTickCount
GetVersionExA
FreeLibrary
GetModuleHandleA
SetCurrentDirectoryA
GetCommandLineA
GetFileSize
ReadFile
SetFilePointer
OutputDebugStringA
DeviceIoControl
GetProcessTimes
GetSystemTimeAsFileTime
GetSystemInfo
MapViewOfFile
UnmapViewOfFile
GetLargePageMinimum
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalFree
LocalAlloc
CreateFileMappingA
OpenFileMappingA
FindResourceA
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
MoveFileA
TerminateProcess
FileTimeToSystemTime
Module32First
Module32Next
GetFullPathNameA
WaitForSingleObject
CreateEventA
CopyFileA
GetCurrentDirectoryA
CreateDirectoryA
LocalFileTimeToFileTime
GetCurrentProcess
SystemTimeToFileTime
GlobalMemoryStatusEx
GetFileInformationByHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindFirstFileExA
GetTimeZoneInformation
FlushFileBuffers
ReadConsoleW
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
LocalFree
SetFileAttributesA
K32GetModuleFileNameExA
GetComputerNameA
InitializeSListHead
LoadLibraryA
WinExec
GetProcAddress
OpenProcess
Sleep
GetProcessHeap
HeapFree
GetLastError
CloseHandle
DeleteFileA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetConsoleCtrlHandler
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
CreateFileW
SetFilePointerEx
WriteConsoleW
HeapSize
HeapReAlloc
SetEndOfFile
SetLastError
EncodePointer
SetUnhandledExceptionFilter
CreateFileA
SetFileTime
MultiByteToWideChar
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileType
InitializeCriticalSectionAndSpinCount
WriteFile
GetStringTypeW
GetCurrentThread
HeapAlloc
GetACP
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TlsAlloc
user32
FindWindowExA
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
GetWindowRect
GetClassNameA
wsprintfA
GetDesktopWindow
shell32
SHCreateDirectoryExA
SHGetSpecialFolderPathA
ole32
CoSetProxyBlanket
CoInitializeSecurity
CLSIDFromString
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
advapi32
OpenProcessToken
GetNamedSecurityInfoA
RegSetValueExW
RegFlushKey
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
ChangeServiceConfigA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
SetServiceStatus
RegisterServiceCtrlHandlerA
AdjustTokenPrivileges
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
SetEntriesInAclA
iphlpapi
GetIpNetTable
GetAdaptersInfo
GetIpForwardTable
dbghelp
MiniDumpWriteDump
winmm
timeKillEvent
cfgmgr32
CM_Get_Device_Interface_ListW
wininet
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
InternetOpenA
FindFirstUrlCacheEntryA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shlwapi
PathFileExistsA
Sections
.text Size: 614KB - Virtual size: 614KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ