Static task
static1
Behavioral task
behavioral1
Sample
6d374b72597ed91439b2d5e810595f2381f59d271b3310432e55ca2e102f0131.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6d374b72597ed91439b2d5e810595f2381f59d271b3310432e55ca2e102f0131.exe
Resource
win10v2004-20231020-en
General
-
Target
6d374b72597ed91439b2d5e810595f2381f59d271b3310432e55ca2e102f0131
-
Size
2.5MB
-
MD5
e90cfc84dd8bb64edb91a03e19637d3a
-
SHA1
18f9eceb106aedb4347ef2cf623717c38b7ee52e
-
SHA256
6d374b72597ed91439b2d5e810595f2381f59d271b3310432e55ca2e102f0131
-
SHA512
4d74626bdf9fc0a98af57c125825ea72c443b5ed4688c920499f9ff03d551cffaf6f70c58b36c4733cdcb805fe5798d797f0675f331eb136262ff0fc782c45bd
-
SSDEEP
49152:BZn8l1PCBemMQ2HUQnxM8y+Z14m/Mv3PMTBXHvwyCbifiCDra2i:vn8lUe+wZxM44m/U3ryU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d374b72597ed91439b2d5e810595f2381f59d271b3310432e55ca2e102f0131
Files
-
6d374b72597ed91439b2d5e810595f2381f59d271b3310432e55ca2e102f0131.exe windows:5 windows x86
6e2d914db73a0b44187069073cab3684
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
VirtualQuery
DeleteFileW
GetTickCount
MoveFileW
GetVersionExW
LoadLibraryW
GetProcAddress
FreeLibrary
WriteFile
SetFilePointer
CreateFileW
GetCurrentThreadId
GetLocalTime
HeapFree
OpenProcess
HeapAlloc
LocalFree
GetProcessHeap
Thread32Next
Thread32First
SuspendThread
ResumeThread
InterlockedExchange
OpenThread
InitializeCriticalSectionAndSpinCount
lstrlenW
ReadFile
SetEndOfFile
GetFileSize
GetACP
GlobalMemoryStatusEx
SetLastError
InterlockedExchangeAdd
GetCurrentProcess
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetModuleHandleW
GetFileAttributesW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
WaitForSingleObject
MapViewOfFile
CreateFileMappingW
SetEvent
CreateEventW
UnmapViewOfFile
WaitForMultipleObjects
OpenMutexW
Sleep
GetCurrentProcessId
GetModuleFileNameW
CloseHandle
CreateMutexW
MoveFileExW
GetLastError
WriteConsoleW
CreateToolhelp32Snapshot
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
SearchPathW
GetEnvironmentVariableW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
QueryDosDeviceW
CreateProcessW
GetExitCodeProcess
TerminateProcess
ResetEvent
MultiByteToWideChar
WideCharToMultiByte
ReleaseMutex
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SetFileTime
GetFileTime
LoadLibraryExW
FindNextFileW
FindClose
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
GetComputerNameExW
RaiseException
DecodePointer
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
GetTempFileNameW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
FormatMessageW
DeviceIoControl
LoadLibraryA
GetFileSizeEx
GetStringTypeW
EncodePointer
IsProcessorFeaturePresent
GetModuleHandleExW
GetCPInfo
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
CompareStringW
LCMapStringW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlCaptureContext
ReleaseSemaphore
GetProcessId
TerminateThread
CreateThread
CreateSemaphoreW
VirtualQueryEx
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
AreFileApisANSI
HeapCreate
OutputDebugStringA
LockFile
GetFullPathNameA
UnlockFileEx
HeapValidate
HeapSize
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
OutputDebugStringW
FlushViewOfFile
CreateFileA
GetVersionExA
DeleteFileA
HeapReAlloc
HeapCompact
HeapDestroy
UnlockFile
CreateFileMappingA
LockFileEx
FormatMessageA
FlushFileBuffers
GetStdHandle
GetFileType
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
ExitThread
ExitProcess
user32
wsprintfW
GetWindowThreadProcessId
FindWindowExW
IsWindowVisible
SendMessageW
ShowWindow
IsWindow
SetForegroundWindow
IsIconic
advapi32
RegCreateKeyExW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 325KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ