Static task
static1
Behavioral task
behavioral1
Sample
6c9e2e7b502d3b683630eb48cebd4823f6a549df3c4c308646ff43987d633f64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6c9e2e7b502d3b683630eb48cebd4823f6a549df3c4c308646ff43987d633f64.exe
Resource
win10v2004-20230915-en
General
-
Target
6c9e2e7b502d3b683630eb48cebd4823f6a549df3c4c308646ff43987d633f64
-
Size
368KB
-
MD5
17478b306579275ec95095b46c77a584
-
SHA1
034fd5de77de60bcf4201793994c361827172871
-
SHA256
6c9e2e7b502d3b683630eb48cebd4823f6a549df3c4c308646ff43987d633f64
-
SHA512
79f3bf121519f32551fc677608ccb7a5e7436a248fd2db9fe816963af99673e0a8f315f7a222ba4533052319a4bd4bddfdc842d5737305b25fb23be9222819dd
-
SSDEEP
6144:9bciOpY2/EGR16cPT8F+IVhSMXlBXBWgEyZ4Wi/EWTz:+1so6a1IVhSMXllxG/9z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c9e2e7b502d3b683630eb48cebd4823f6a549df3c4c308646ff43987d633f64
Files
-
6c9e2e7b502d3b683630eb48cebd4823f6a549df3c4c308646ff43987d633f64.exe windows:6 windows x86
fbba7122faf317253107d55c73a90380
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
WTSQueryUserToken
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
kernel32
SetFilePointerEx
GetCurrentProcessId
GetCurrentProcess
CreateProcessW
GetProcessId
LocalFree
CreateFileW
HeapFree
GetProcessHeap
SetLastError
SleepEx
GetTickCount64
GetStringTypeW
WriteFile
GetExitCodeProcess
SetCurrentDirectoryW
FreeConsole
CloseHandle
AttachConsole
GetLastError
OpenProcess
WaitForSingleObject
GetEnvironmentVariableW
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleOutputCP
HeapSize
HeapReAlloc
HeapAlloc
SetConsoleMode
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExpandEnvironmentStringsW
GetModuleFileNameW
MultiByteToWideChar
FormatMessageW
GetModuleHandleW
GetFileInformationByHandleEx
GetStdHandle
DecodePointer
GetConsoleMode
WriteConsoleW
GetFileType
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetProcAddress
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
SetStdHandle
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetTimeZoneInformation
WideCharToMultiByte
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
advapi32
StartServiceW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
LookupPrivilegeValueW
IsWellKnownSid
GetTokenInformation
AdjustTokenPrivileges
SetThreadToken
ConvertStringSidToSidW
SetTokenInformation
GetLengthSid
FreeSid
DuplicateTokenEx
CheckTokenMembership
AllocateAndInitializeSid
OpenProcessToken
CreateProcessAsUserW
shell32
ShellExecuteExW
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ