Static task
static1
Behavioral task
behavioral1
Sample
6ee07e3ca24f948f2e289ea5c658bc7acc83c9ec43ab7efeb556792c93c2d121.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6ee07e3ca24f948f2e289ea5c658bc7acc83c9ec43ab7efeb556792c93c2d121.exe
Resource
win10v2004-20230915-en
General
-
Target
6ee07e3ca24f948f2e289ea5c658bc7acc83c9ec43ab7efeb556792c93c2d121
-
Size
1.6MB
-
MD5
3d3d151c1dfb25600def48f4291d206f
-
SHA1
9d38cb303bda8c44c1663c49e300c58f9878ed7a
-
SHA256
6ee07e3ca24f948f2e289ea5c658bc7acc83c9ec43ab7efeb556792c93c2d121
-
SHA512
0ca87cf220c3a480f49ad2a55f2a148d5e7a49190bbc548cfd2d6d3231e9d0e657f179bf153afd242798eafaf43358c32dc738204b7c77db92037d7f5c0be791
-
SSDEEP
12288:pg4zvLSBD8MT52TUzz7RKC2WsyWaKvB9Ug43PAD4QCnQqHnhOe1di1jJJ0/gx2rb:ppLCJApLLDOQgOYdiFNs+HVC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ee07e3ca24f948f2e289ea5c658bc7acc83c9ec43ab7efeb556792c93c2d121
Files
-
6ee07e3ca24f948f2e289ea5c658bc7acc83c9ec43ab7efeb556792c93c2d121.exe windows:5 windows x64
721750e1f590e3ae5ec18189a295b293
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
GetErrorInfo
SysFreeString
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
user32
MessageBoxA
CharNextW
LoadStringW
SetWindowLongPtrW
CreateWindowExW
wsprintfW
UnregisterClassW
TranslateMessage
RegisterClassW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
GetSystemMetrics
GetMessageW
GetCursorPos
GetClassInfoW
GetAsyncKeyState
DispatchMessageW
DefWindowProcW
CharUpperW
CharLowerBuffW
CharLowerW
kernel32
Sleep
VirtualFree
VirtualAlloc
HeapFree
HeapAlloc
GetProcessHeap
lstrlenW
lstrcpynW
VirtualQuery
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwindEx
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
lstrlenA
lstrlenW
lstrcpynA
lstrcpynW
lstrcmpiA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
SwitchToThread
SuspendThread
SetThreadPriority
SetLastError
SetFilePointerEx
SetFilePointer
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
ReadFile
OpenProcess
LocalFree
LoadLibraryA
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalMemoryStatusEx
GetVersionExW
GetTickCount
GetThreadPriority
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileSize
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
GetCPInfoExW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
EnumSystemLocalesW
EnumCalendarInfoW
EnterCriticalSection
DeleteCriticalSection
CreateFileW
CreateEventW
CompareStringW
CloseHandle
Sleep
GetFileSizeEx
QueryFullProcessImageNameW
ole32
CoUninitialize
CoInitialize
msvcrt
isxdigit
isspace
ispunct
isprint
isgraph
iscntrl
isalpha
isalnum
strchr
strncmp
strcmp
memset
memmove
memcpy
memcmp
_wcslwr
shlwapi
StrStrIW
setupapi
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 37KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 432B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ