Static task
static1
Behavioral task
behavioral1
Sample
6604420e4b12bb697620dcefcfb6d36b4cd1c0a24505186a6df21fd89097da6a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6604420e4b12bb697620dcefcfb6d36b4cd1c0a24505186a6df21fd89097da6a.exe
Resource
win10v2004-20230915-en
General
-
Target
6604420e4b12bb697620dcefcfb6d36b4cd1c0a24505186a6df21fd89097da6a
-
Size
698KB
-
MD5
79bee61b14988e0a7bd26a5ff85748db
-
SHA1
6c8861d2b730dec45b22989c73dbec6558e703e6
-
SHA256
6604420e4b12bb697620dcefcfb6d36b4cd1c0a24505186a6df21fd89097da6a
-
SHA512
0aa70057cd54d3cfe62b24b54a0c5e1ae07d511ffe58b448f5e6eb96c21dc723ca3cf8c82a4970c0424e4e6c48e63686bc83687fa53771f837bc2e57207e6e15
-
SSDEEP
12288:VItpCG73kkZ4RbVdHwiZrvh9OAmOQkPlgOrNwJTzB:VItLbkkZ4RbVdHwiZrvhIArQkNgOrNwz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6604420e4b12bb697620dcefcfb6d36b4cd1c0a24505186a6df21fd89097da6a
Files
-
6604420e4b12bb697620dcefcfb6d36b4cd1c0a24505186a6df21fd89097da6a.exe windows:5 windows x64
4f3c23426f69c195d46b2d3a9afac448
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ExpandEnvironmentStringsW
GetModuleFileNameW
GetFileAttributesW
LoadLibraryA
GetModuleHandleW
LoadLibraryExW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
CreateFileW
GetLastError
GetFileAttributesExW
SearchPathW
lstrlenW
GetVersionExW
lstrcatW
lstrcpyW
lstrcmpiW
ReadFile
WriteFile
SetFilePointer
SetEndOfFile
DeleteFileW
CloseHandle
GetFileSizeEx
GetDriveTypeW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SetFileTime
GetFileSize
GetFileTime
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
SetFileAttributesW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
MoveFileExW
CopyFileW
GetTempFileNameW
MoveFileW
FindNextFileW
FindClose
WaitForMultipleObjects
WaitForSingleObject
LocalFree
GetCurrentProcessId
CreateProcessW
GetExitCodeProcess
CreateMutexW
ReleaseMutex
Sleep
OpenMutexW
HeapFree
GetCurrentThreadId
GetComputerNameExW
OpenProcess
GlobalAlloc
GlobalFree
HeapAlloc
GetProcessHeap
LockResource
GetSystemInfo
LoadResource
FindResourceW
FreeLibrary
QueryDosDeviceW
GetCurrentProcess
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetStdHandle
GetEnvironmentVariableW
GetFileType
MultiByteToWideChar
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameA
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
SetConsoleCtrlHandler
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
FindFirstFileExA
FindFirstFileExW
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
WriteConsoleW
GetProcAddress
FormatMessageW
LoadLibraryW
RtlUnwind
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
advapi32
DeregisterEventSource
ReportEventW
RegisterEventSourceW
Sections
.text Size: 430KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ