Static task
static1
Behavioral task
behavioral1
Sample
6ba8612b02873dcc1c129f0f8d3e25b5394583d9d0e4eca6e017de77ab803805.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6ba8612b02873dcc1c129f0f8d3e25b5394583d9d0e4eca6e017de77ab803805.exe
Resource
win10v2004-20230915-en
General
-
Target
6ba8612b02873dcc1c129f0f8d3e25b5394583d9d0e4eca6e017de77ab803805
-
Size
128KB
-
MD5
cf76aee6a25c02be3e11388e062d1035
-
SHA1
42fd92a452f8820d69758cc83ce1982467d898db
-
SHA256
6ba8612b02873dcc1c129f0f8d3e25b5394583d9d0e4eca6e017de77ab803805
-
SHA512
4e0160d24fbef10fc4a292e15873619f6f6d07c4b46d86da93e31969c2a4acf887d934595a231606e19c3a697b29e3aa0d9a67c6cc8745d3480cbab0a6f81463
-
SSDEEP
3072:OyiuIRBZeLYtOsMRF/pstBaDqwONnct437Bl3N2Uz:OywBZgVRF/p/uwONct43j92U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ba8612b02873dcc1c129f0f8d3e25b5394583d9d0e4eca6e017de77ab803805
Files
-
6ba8612b02873dcc1c129f0f8d3e25b5394583d9d0e4eca6e017de77ab803805.exe windows:5 windows x64
ba9bc0f5f28dc13e839518b765279342
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mfc140u
ord8167
ord8084
ord12544
ord8023
ord5183
ord2439
ord12222
ord12223
ord14210
ord7650
ord14216
ord9089
ord4011
ord3949
ord12625
ord7668
ord2011
ord11664
ord11665
ord14088
ord12212
ord7719
ord14288
ord6121
ord14290
ord6123
ord14289
ord6122
ord3731
ord5706
ord11921
ord11929
ord7920
ord10124
ord11933
ord11901
ord12606
ord5555
ord9941
ord6614
ord4445
ord1089
ord3951
ord13545
ord2178
ord7716
ord1450
ord983
ord7393
ord10070
ord8161
ord1503
ord1033
ord286
ord296
ord12240
ord446
ord2370
ord3203
ord1489
ord990
ord1454
ord2212
ord7182
ord8900
ord9946
ord7922
ord3599
ord5227
ord7450
ord7461
ord7460
ord5916
ord4675
ord2222
ord2909
ord10163
ord5120
ord2415
ord2431
ord2301
ord3713
ord878
ord1369
ord10727
ord8507
ord13767
ord7191
ord13864
ord11854
ord8731
ord6285
ord8901
ord3172
ord2697
ord13397
ord6000
ord3071
ord3307
ord3308
ord11085
ord1491
ord10704
ord265
ord2346
ord4725
ord2350
ord5062
ord5229
ord5083
ord4656
ord7233
ord4726
ord2686
ord266
ord6002
ord13401
ord3212
ord3209
ord7913
ord2698
ord14360
ord9976
ord9978
ord9977
ord9975
ord9979
ord5451
ord11414
ord11415
ord8830
ord11771
ord3718
ord11625
ord14209
ord8656
ord11902
ord6729
ord10691
ord8947
ord3173
ord13513
ord11944
ord11940
ord1700
ord1722
ord1748
ord1734
ord1755
ord4776
ord11813
ord4843
ord4788
ord4947
ord2187
ord4806
ord4800
ord4794
ord4853
ord4837
ord4782
ord4859
ord4814
ord4752
ord4767
ord4828
ord4360
ord9384
ord4352
ord2967
ord14211
ord7651
ord14217
ord6631
ord11406
ord13354
ord5723
ord2629
ord11806
ord3812
ord3279
ord3278
ord11850
ord5080
ord5363
ord5552
ord9041
ord5339
ord5582
kernel32
LoadLibraryA
OutputDebugStringW
FormatMessageW
OpenProcess
GetModuleHandleA
lstrcmpA
GetCurrentThreadId
lstrcpynW
DeleteCriticalSection
FreeLibrary
GetCurrentProcessId
LocalFree
GetProcAddress
LoadLibraryW
CloseHandle
GetLastError
Sleep
MultiByteToWideChar
GetVersionExW
GetFileAttributesW
LocalAlloc
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
TerminateProcess
lstrcmpiA
GetExitCodeProcess
ProcessIdToSessionId
GetCommandLineW
ResumeThread
ReadProcessMemory
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
lstrcpynA
GetCurrentProcess
VirtualFree
SetLastError
VirtualProtect
user32
GetWindow
GetActiveWindow
MessageBoxA
BringWindowToTop
ShowWindowAsync
IsZoomed
DrawIcon
CallWindowProcW
AppendMenuW
GetSystemMenu
GetLastActivePopup
LoadIconW
GetClassNameW
GetUserObjectInformationW
GetClientRect
GetProcessWindowStation
SetForegroundWindow
IsIconic
DefWindowProcW
SetWindowLongPtrW
SendMessageW
GetSystemMetrics
MessageBoxW
PostQuitMessage
EnableWindow
GetWindowRect
advapi32
LookupAccountSidW
OpenProcessToken
RegOpenKeyW
GetTokenInformation
RegCloseKey
RegQueryValueExW
shell32
CommandLineToArgvW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathRemoveExtensionA
PathIsRelativeW
PathUnquoteSpacesW
ole32
CoTaskMemAlloc
CoCreateInstance
oleaut32
SysFreeString
GetErrorInfo
VariantClear
SysAllocString
winsta
WinStationQueryInformationW
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception
__current_exception_context
_CxxThrowException
memcpy
strchr
wcschr
__C_specific_handler
wcsrchr
__std_terminate
memset
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_cexit
_exit
_initterm_e
_initterm
exit
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
_c_exit
_set_app_type
_seh_filter_exe
terminate
_register_onexit_function
api-ms-win-crt-string-l1-1-0
strncpy
wcsncpy
strcmp
_wcsicmp
wcsncmp
strncat
_wcsnicmp
_stricmp
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswscanf
__stdio_common_vswprintf_s
_set_fmode
__p__commode
api-ms-win-crt-convert-l1-1-0
_wtoi
_wtol
api-ms-win-crt-heap-l1-1-0
free
calloc
malloc
_recalloc
_set_new_mode
api-ms-win-crt-environment-l1-1-0
_wgetenv
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ