Static task
static1
Behavioral task
behavioral1
Sample
6e7d998291ab411399b45d0c34bc7c14d00b37bf3f8c539223b2ed1a2870c6e9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6e7d998291ab411399b45d0c34bc7c14d00b37bf3f8c539223b2ed1a2870c6e9.exe
Resource
win10v2004-20230915-en
General
-
Target
6e7d998291ab411399b45d0c34bc7c14d00b37bf3f8c539223b2ed1a2870c6e9
-
Size
1.3MB
-
MD5
2aba76a28ea0b9a77c5b7dad34701197
-
SHA1
d255518442a0deb394e002783ed568675d53ccde
-
SHA256
6e7d998291ab411399b45d0c34bc7c14d00b37bf3f8c539223b2ed1a2870c6e9
-
SHA512
b6294185c5a9450819dd8a31f8a965bd6e7d86d428d2ba04d485d094780dc656192e18f0feecb9ddd9ff3c47e46cf64b9932cee36d9d0b1c97700789c44d7dfa
-
SSDEEP
24576:8mRyScKKxPh8eYHMT9ILU4GibbGPqThwJE:8m0ScKKxPhmHyIpXG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e7d998291ab411399b45d0c34bc7c14d00b37bf3f8c539223b2ed1a2870c6e9
Files
-
6e7d998291ab411399b45d0c34bc7c14d00b37bf3f8c539223b2ed1a2870c6e9.exe windows:6 windows x64
2a6817d05eac53d91c3a508416373490
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SystemTimeToFileTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetConsoleOutputCP
HeapSize
ReleaseSRWLockExclusive
FreeEnvironmentStringsW
LCMapStringW
ReleaseMutex
FindClose
ReleaseSRWLockShared
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
AcquireSRWLockExclusive
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
GetProcAddress
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
SystemTimeToTzSpecificLocalTime
CompareStringW
GetCommandLineW
FlushFileBuffers
SetFileInformationByHandle
DuplicateHandle
SetFilePointerEx
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
GetStdHandle
GetCurrentProcessId
SetStdHandle
GetCPInfo
WriteFileEx
SleepEx
ReadFileEx
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
TzSpecificLocalTimeToSystemTime
TryAcquireSRWLockExclusive
HeapAlloc
GetProcessHeap
HeapFree
GetOEMCP
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetModuleHandleA
FindNextFileW
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetACP
IsValidCodePage
CreateDirectoryW
FindFirstFileW
CreateEventW
ReadFile
GetOverlappedResult
CancelIo
FindFirstFileExW
GetConsoleMode
GetFileType
GetCommandLineA
GetModuleHandleExW
WriteFile
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
SetCurrentDirectoryW
ExitProcess
GetFullPathNameW
CloseHandle
CreateNamedPipeW
WaitForMultipleObjects
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
GetLastError
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
TlsGetValue
TlsSetValue
LoadLibraryExW
FreeLibrary
TlsFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
CreateMutexW
GetCurrentThreadId
InitializeSListHead
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
EnterCriticalSection
advapi32
SystemFunction036
ntdll
RtlNtStatusToDosError
NtReadFile
NtWriteFile
bcrypt
BCryptGenRandom
Sections
.text Size: 1007KB - Virtual size: 1006KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 251KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ